After deploying the initial attack, the researcher was able to escape the macOS sandbox
This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/
Read the original article:
After deploying the initial attack, the researcher was able to escape the macOS sandbox
Read the original article: