cognitive cybersecurity intelligence

News and Analysis

Search

Hackers Abuse COM Objects for Fileless Malware Lateral Movements

Researchers have uncovered a sophisticated attack leveraging Component Object Model (COM) objects for fileless malware execution and lateral movement within networks. This technique manipulates legitimate Windows functionality, evading security measures, and allows for privileged code execution within protected processes. It highlights the need for monitoring registry manipulations and CLR load events to combat this evolving threat.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

Identity and Access Management (IAM)

Identity and Access Management (IAM)

CISOs face mounting pressure to secure digital identities, with 80% of breaches stemming from compromised credentials. Identity and Access Management (IAM) must evolve into a