Feb. 29, 2024, 8:11 a.m. | Pierluigi Paganini

Security Affairs securityaffairs.co

North Korea-linked Lazarus APT exploited a zero-day flaw in the Windows AppLocker driver (appid.sys) to gain kernel-level access to target systems. Avast researchers observed North Korea-linked Lazarus APT group using an admin-to-kernel exploit for a zero-day vulnerability in the appid.sys AppLocker driver.  The zero-day, tracked as CVE-2024-21338 has been addressed by Microsoft in the February […]

access admin applocker apt apt group avast breaking news cve cve-2024-21338 driver exploit exploited flaw hacking information security news it information security kernel kernel privileges korea lazarus lazarus apt lazarus apt group malware north north korea pierluigi paganini privileges researchers rootkit systems target vulnerability windows windows driver zero-day zero-day flaw zero-day vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC