Feb. 29, 2024, 5:41 a.m. | Balaji

GBHackers On Security gbhackers.com

The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a critical level of system access. This vulnerability, identified as CVE-2024-21338, was found in the appid.Sys AppLocker driver was patched by Microsoft in their February Patch Tuesday update following a report from Avast Threat Labs. The […]


The post Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security …

access applocker computer security critical cve cve-2024-21338 cybercriminal cyber security driver exploited february found hackers hacks kernel kernel privileges lazarus lazarus group malware microsoft organization patch patch tuesday privileges report system tuesday update vulnerability well-known windows windows 0-day zero-day zero-day vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States