Tag: application isolation

  • Hacker News: OSS-SEC: Three bypasses of Ubuntu’s unprivileged user namespace restrictions

    Source URL: https://seclists.org/oss-sec/2025/q1/253 Source: Hacker News Title: OSS-SEC: Three bypasses of Ubuntu’s unprivileged user namespace restrictions Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text describes three significant bypass vulnerabilities affecting Ubuntu’s unprivileged user namespace restrictions, as outlined in a Qualys Security Advisory. It highlights how unprivileged users can exploit these vulnerabilities to…

  • Hacker News: Syd: An Introduction to Secure Application Sandboxing for Linux [video]

    Source URL: https://fosdem.org/2025/schedule/event/fosdem-2025-4176-syd-an-introduction-to-secure-application-sandboxing-for-linux/ Source: Hacker News Title: Syd: An Introduction to Secure Application Sandboxing for Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: The text introduces Syd, a GPL-3 licensed application kernel for Linux, designed for securing applications through advanced sandboxing techniques. Its modern architecture and features address critical vulnerabilities and enhance security…

  • CSA: BeyondTrust Breach: We Need Remote Access Security

    Source URL: https://cloudsecurityalliance.org/blog/2025/02/07/beyondtrust-breach-a-wake-up-call-for-remote-access-security Source: CSA Title: BeyondTrust Breach: We Need Remote Access Security Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a recent security incident involving BeyondTrust and the US Treasury Department, emphasizing vulnerabilities in traditional remote access solutions. It advocates for adopting proactive security measures such as the principle of least…

  • Hacker News: TCC and the macOS Platform Sandbox Policy

    Source URL: https://bdash.net.nz/posts/tcc-and-the-platform-sandbox-policy/ Source: Hacker News Title: TCC and the macOS Platform Sandbox Policy Feedly Summary: Comments AI Summary and Description: Yes Summary: The text delves into the Transparency, Consent, and Control (TCC) subsystem on macOS, outlining its functions in managing access to sensitive resources on the platform. It highlights the interplay between TCC and…