Tag
#auth
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America.
Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.
Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.
**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\\SYSTEM" account.
Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally.
External control of file name or path in Azure Compute Gallery allows an authorized attacker to elevate privileges over a network.
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.