Attackers show renewed relentlessness in exploiting OS vulnerabilities that also circumvent defense and detection measures.