What is the most harm that a non-root logged-in user can do on a Linux machine? [closed]

Assume Alice has physical access to Bob’s Linux machine (but can only use the mouse/keyboard). What is the worst that can happen to Bob’s files? For example could she write in a file owned by Bob even if Bob didn’t give permission to her?
Continue reading What is the most harm that a non-root logged-in user can do on a Linux machine? [closed]

For Hackers, APIs are Low-Hanging Fruit

By 2022, API abuses will become the most frequent attack vector, predicts Gartner. We’re already witnessing new API exploits reach the headlines on a near-daily basis. Most infamous was the Equifax breach, an attack that exposed 147 million accounts i… Continue reading For Hackers, APIs are Low-Hanging Fruit