Search Results - "remote code execution"

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Monitoring Keamanan Runtime pada Kubernetes Menggunakan Falco by Ryan Fadhillah, Nur Rohman Rosyid

    Published 2025-05-01
    “…Proses pengujian kapabilitas deteksi dilakukan terhadap tiga skenario serangan yang termasuk kedalam daftar resiko yang ada pada OWASP Top 10 Cloud-Native Application Security, di antaranya yaitu Remote Code Execution (RCE), exfiltration using common Linux binaries, dan privileged container. …”
    Get full text
    Article
  2. 2

    A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality by Rebecca Acheampong, Dorin-Mircea Popovici, Titus C. Balan, Alexandre Rekeraho, Ionut-Alexandru Oprea

    Published 2025-05-01
    “…This methodology provides a comprehensive risk evaluation method, identifying critical vulnerabilities such as Remote Code Execution (RCE), social engineering, excessive permission exploitation, unauthorized access, and data exfiltration. …”
    Get full text
    Article
  3. 3

    Infrastructure as Code for Cybersecurity Training by Rui Pinto, Rolando Martins, Carlos Novo

    Published 2023-10-01
    “…Lastly, we explore several up-to-date vulnerabilities that are constantly messing with the lives of individuals and organizations, most related to Privilege Escalation, Remote Code Execution attacks, and Incident Forensics, allowing the improvement of skills concerning Red team and Blue team scenarios. …”
    Get full text
    Article