Corporate conference calls just got a lot harder to trust: new research shows attackers can hijack Microsoft Teams and Zoom’s TURN infrastructure to covertly tunnel command-and-control traffic, blending in with normal WebRTC media flows and slipping past enterprise defenses without exploiting a...
Cookie-based attacks and overlooked tokens have quietly lingered on the periphery of infosec conference talks for years, but recent research presented at OffensiveCon25 has shone a spotlight on the very heart of Windows 11's Kernel Transaction Manager (KTM). This kernel subsystem—once considered...
Here is a summary and important mitigation information based on your shared CISA advisory about the new Fortinet vulnerabilities (CVE-2024-21762, CVE-2023-27997, and CVE-2022-42475):
Summary:
Threat: A threat actor is creating a malicious file using previously exploited Fortinet...