A new cyberattack technique allows attackers to bypass EDR systems using low-privileged accounts by employing path obfuscation and masquerading to disguise malicious files as legitimate processes. They create deceptive folder names with Unicode characters, complicating detection and analysis. To counter this, security teams should enhance logging rules and restrict folder creation permissions to critical directories.
Abandoned AWS S3 Buckets Can be Reused to Hijack Global Software Supply Chain
WatchTowr Labs has identified a security flaw in abandoned AWS S3 buckets that could allow attackers to hijack software supply chains, potentially leading to large-scale