March 1, 2024, 1:21 a.m. |

GovInfoSecurity.com RSS Syndication www.govinfosecurity.com

Microsoft Fixed Bug in February That Gave Kernel-Level Access to North Korean APT
North Korea's Lazarus hackers exploited a Windows AppLocker driver zero-day to gain kernel-level access and turn off security tools that could detect the group's bring-your-own-vulnerable-driver exploitation techniques. Microsoft fixed the bug in its February patch dump.

access applocker bug detect driver exploitation exploitation techniques exploited exploits february hackers kernel korea lazarus lazarus group microsoft north north korean own patch security security tools techniques tools turn vulnerable windows zero-day

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC