Security News > 2018 > October > Trivial Post-Intrusion Attack Exploits Windows RID

2018-10-19 14:22
Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.
News URL
https://threatpost.com/trivial-post-intrusion-attack-exploits-windows-rid/138448/
Related news
- ⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More (source)
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054) (source)
- Windows NTLM hash leak flaw exploited in phishing attacks on governments (source)
- Craft CMS RCE exploit chain used in zero-day attacks to steal data (source)
- How cybercriminals exploit psychological triggers in social engineering attacks (source)
- Play ransomware exploited Windows logging flaw in zero-day attacks (source)
- Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks (source)
- China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil (source)