all InfoSec news
Malware Families Adapting To COM Hijacking Technique For Persistence
Cyber Security News cybersecuritynews.com
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a specific registry key related to the COM object. This allows the threat actors to achieve both persistence and privilege escalation on target systems. However, several malware families have been found […]
The post Malware Families Adapting To COM Hijacking Technique For Persistence appeared first on Cyber Security News.
architecture cyber security cyber-security-research endpoint security escalation exploit families hijacking key malware malware families object persistence privilege privilege escalation registry registry key systems target the com threat threat actors value windows