Exploits and vulnerabilities in Q4 2024
SecureList
FEBRUARY 26, 2025
Among notable techniques in Q4, attackers leveraged undocumented RPC interfaces and targeted the Windows authentication mechanism. According to Microsoft documentation ,msc files can be used for system administration. Statistics on registered vulnerabilities This section contains statistics on registered vulnerabilities.
Let's personalize your content