Product
Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)
2 rules 1 CVEA use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.
CVE-2026-7339: Heap Buffer Overflow in WebRTC
2 rules 1 CVEA heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.
Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)
2 rules 1 TTP 1 CVECVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.
Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)
2 rules 1 TTP 1 CVECVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)
2 rules 1 CVECVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)
2 rules 1 TTP 1 CVECVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)
2 rules 1 TTP 1 CVECVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.
Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)
2 rules 1 CVECVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.
Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)
2 rules 2 TTPs 1 CVECVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.
Browser Process Spawned from an Unusual Parent
2 rules 1 TTPAttackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.
Startup or Run Key Registry Modification
3 rules 2 TTPsAttackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.
RMM Domain DNS Queries from Non-Browser Processes
2 rules 75 IOCsDetects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.
DNS-over-HTTPS Enabled via Registry Modification
3 rules 2 TTPsDetection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.