Jan. 23, 2023, 4:30 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Starting in July of 2022, the Windows CSRSS process entered the consciousness of the infosec community as the source of several local privilege escalation vulnerabilities in Microsoft Windows. The first public information appeared on July 12 with the release of the patch for CVE-2022-22047, which was being actively exploited. Shortly thereafter, Microsoft published an article providing some technical details and revealing that the threat actor involved was an Austrian hack-for-hire group tracked by Microsoft as KNOTWEED. Fortuitously, these developments …

actively exploited actor article cache cache poisoning community context csrss cve cve-2022-22047 escalation exploited exploiting hack hack-for-hire hire information infosec infosec community july local local privilege escalation microsoft microsoft windows patch poisoning privilege privilege escalation process public release technical threat threat actor vulnerabilities windows

Security Specialist

@ Nestlé | St. Louis, MO, US, 63164

Cybersecurity Analyst

@ Dana Incorporated | Pune, MH, IN, 411057

Sr. Application Security Engineer

@ CyberCube | United States

Linux DevSecOps Administrator (Remote)

@ Accenture Federal Services | Arlington, VA

Cyber Security Intern or Co-op

@ Langan | Parsippany, NJ, US, 07054-2172

Security Advocate - Application Security

@ Datadog | New York, USA, Remote