• zante@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 month ago

    No mention of transmission methods as far as I understand the article

    • Buffalox@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 month ago

      The whole thing sounds fishy. Like it’s trying to convince people Linux is inherently vulnerable.

      exploiting more than 20,000 common misconfigurations

      Like WTF?

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 month ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.