fileless attacks

  1. June Patch Tuesday: Critical Zero-Day Exploit CVE-2025-33053 and Key Security Updates

    June’s Patch Tuesday has once again thrust cybersecurity into the spotlight as Microsoft patches a fresh batch of vulnerabilities, including a highly critical zero-day that has already been exploited in the wild. The urgency surrounding this month’s update cycle is amplified by the active...
  2. RemoteMonologue: The Stealthy DCOM & NTLM Attack Changing Cybersecurity Defense

    In the ever-evolving landscape of cybersecurity, attackers continually adapt their methods to bypass advanced defenses. A recent development in this cat-and-mouse game is the emergence of "RemoteMonologue," a technique that exploits the Distributed Component Object Model (DCOM) in Windows...
  3. RemoteMonologue: A Fileless Red Team Technique Exploiting DCOM and NTLM

    Red teams have a new trick up their sleeve. In an era when Microsoft fortifies credential theft defenses and Endpoint Detection and Response (EDR) systems evolve at breakneck speed, attackers are shifting away from classic payload-based methods. Enter RemoteMonologue—a highly innovative...
  4. Fileless Attacks Uncovered: DCOM Weaponization for NTLM Coercions

    Unveiling a Fileless Attack: Weaponizing DCOM for NTLM Authentication Coercions In the ever-evolving landscape of cybersecurity, attackers are continuously refining their tactics to breach networks stealthily. A prime example is the recent research on weaponizing Distributed Component Object...