Black Hills InfoSec - Signed, Trusted, and Abused: Proxy Execution via WebView2

Proxy execution via WebView2 banner

An offensive security perspective on Microsoft Edge WebView2 Runtime, including architectural weaknesses, existing vulnerabilities, and exploitation methods.

The post Signed, Trusted, and Abused: Proxy Execution via WebView2 appeared first on Black Hills Information Security, Inc..



from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/proxy-execution-via-webview2/

Comments

Popular posts from this blog

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"

KnowBe4 - Uncovering the Sophisticated Phishing Campaign Bypassing M365 MFA

The Hacker News - ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More