James Coote’s Post

View profile for James Coote, graphic

A CISO pretending to still be technical

Twice a year, delivr.to takes a deep dive into the notable tradecraft that has caught our attention in the world of phishing and initial access. Each time we compile this list, I'm struck by the creativity and innovation of our adversaries. They continue to find ways to tip the scales in their favour, exploiting human behaviour, long-forgotten file types and emergent vulnerabilities to achieve their goals. This edition's line up is packed full of new & emerging initial access techniques for you to get stuck into, including: - Pastejacking - Image-less QR Codes - Kimsuky APT MSC - GWT HTML Smuggling - Void Banshee MHTML Protocol Handler (CVE-2024–38112) - XLST Stylesheet Scripting - Zip Concatenation - UDL Auth Coercion - SVG foreignObject Element - HTML Blob Smuggling 🔎 Read the full article now: https://lnkd.in/gnZ-bGnm Special thanks to Trellix, Sublime Security, Florian Roth, Melvin L., Oddvar Moe, VMRay, and others, for their research, tooling, and threat intelligence 🫶

delivr.to’s Top 10 Payloads (Dec ‘24): Pastejacking, Image-less QR codes and Concatenated Zip…

delivr.to’s Top 10 Payloads (Dec ‘24): Pastejacking, Image-less QR codes and Concatenated Zip…

blog.delivr.to

Josh Kamdjou

Founder & CEO, Sublime Security

2d

🔥🔥

Like
Reply

To view or add a comment, sign in

Explore topics