Good morning. This is your security briefing for Saturday, January 31, 2026, covering five critical developments in cybersecurity. All attribution is by the article authors. All article analysis is automated.
InfoSec.pub reports on sophisticated techniques for hijacking .NET Global Assembly Cache and Native Image Cache to achieve lateral movement in Windows environments. Security researcher digicat details how attackers can replace or modify strong-named assemblies and precompiled native images, effectively bypassing digital signatures and integrity checks to compromise any application relying on these components.
G3tSyst3m's Infosec Blog presents research on Living off the Process, an advanced code injection technique that abuses RWX memory regions and ROP gadgets to inject shellcode in 8-byte chunks. Author R.B.C. explains how this method hijacks threads and constructs ROP chains to execute payloads while evading EDR detection by disguising malicious activity as legitimate process behavior.
ESET's WeliveSecurity reports that Russia-aligned threat group Sandworm deployed DynoWiper data-wiping malware against a Polish energy sector company in December 2025. The malware overwrites files with random data across three operational phases and shares code similarities with Sandworm's previous ZOV wiper used in Ukraine, marking continued targeting of critical infrastructure.
WatchTowr Labs has discovered two critical pre-authentication remote code execution vulnerabilities in Ivanti Endpoint Manager Mobile, tracked as CVE-2026-1281 and CVE-2026-1340. The vulnerabilities allow unauthenticated attackers to execute arbitrary commands via bash shell injection due to improper input sanitization, posing severe risks of system compromise, data breaches, and ransomware deployment for organizations running unpatched instances.
The Lat61 Threat Intelligence Team has analyzed a sophisticated multi-stage malware campaign delivering Pulsar RAT using Donut loader for in-memory execution. The malware establishes persistence through registry Run keys, employs anti-analysis mechanisms including anti-VM and anti-debugging routines, and steals credentials from browsers, VPNs, messaging apps, and cryptocurrency wallets before exfiltrating data via Discord webhooks and Telegram bots.
That concludes today's briefing.