温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/think/x-force/fileless-lateral-movement-trapped-com-objects
点击访问原文链接

Fileless lateral movement with trapped COM objects | IBM

Security@tiraniddoa blog post@T3nb3wpublished@bohopsSubscribe todaylate bindingCOM HijackingAs notedMS14-009codeguidance@SBousseadenhere@djhohnstein@sanjivkawahttps://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.htmlhttps://mohamed-fakroud.gitbook.io/red-teamings-dojo/abusing-idispatch-for-trapped-com-object-access-and-injecting-into-ppl-processeshttps://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/https://github.com/tyranid/IE11SandboxEscapes/blob/master/CVE-2014-0257/CVE-2014-0257.cpphttps://x.com/SBousseaden/status/1896527307130724759https://github.com/xforcered/ForsHopsWatch all episodes of Mixture of ExpertsUpcoming Webinar | March 31 Achieve continuous compliance in a hybrid data world with IBM Guardium Data Protection Register for this webinar to learn how AI governance helps organizations manage risk, meet evolving regulations and build trusted, responsible AI at scale. Register nowReport IBM X-Force Threat Intelligence Index 2026 Gain insights to prepare and respond to cyberattacks with greater speed and effectiveness with the IBM X-Force® Threat Intelligence Index. Read the reportOn-demand webinars Guardium webinars Learn how to protect your data across its lifecycle from our webinars. Explore on-demand webinarsTechsplainers podcast Cybersecurity explained Techsplainers by IBM breaks down the essentials of cybersecurity, from key concepts to real‑world use cases. Clear, quick episodes help you learn the fundamentals fast. Listen nowGuide Cybersecurity in the era of generative AI Learn how today’s security landscape is changing and how to navigate the challenges and tap into the resilience of generative AI. Read the guideWebinar recording Agent Ops and Responsible AI Join this webinar to explore practical strategies for operating and governing AI agents responsibly at scale, with expert insights on observability, risk management and accountable AI operations. Watch nowReport IDC MarketScape: Cybersecurity consulting services vendor assessment See why IBM has been named a major player and gain insights for selecting the cybersecurity consulting services vendor that best fits your organization’s needs. Read the reportExplainer What is a cyberattack? A cyberattack is an intentional effort to steal, reveal, alter, disable or eliminate data, applications or other assets through unauthorized access. Read the articleExplore IBM GuardiumExplore security solutionsExplore cybersecurity servicesExplore IBM GuardiumDiscover cybersecurity solutions

智能索引记录