Threat actors are increasingly using HTTP cookies as a control channel for PHP-based web shells on Linux servers and to achieve remote code execution, according to findings from the Microsoft Defender Security Research Team. "Instead of exposing command execution through URL parameters or request bo
โกKey InsightsAI analyzingโฆ
I
info@thehackernews.com (The Hacker News)
๐ก
Original Source
The Hacker News
https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.htmlTags:#security#the-hacker-news
Found this useful? Share it!
Read the Full Story
Continue reading on The Hacker News
Related Stories

๐Security
Fraud Rockets Higher in Mobile-First Latin America
about 18 hours ago

๐Security
Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus
about 19 hours ago

๐Security
Niobium Introduces The Fog
about 19 hours ago

๐Security
Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams
about 19 hours ago
