March 1, 2024, 8:12 a.m. | Eswar

Cyber Security News cybersecuritynews.com

The Lazarus threat group has been exploiting a Microsoft vulnerability associated with Windows Kernel Privilege Escalation to establish a kernel-level read/write primitive. This vulnerability was previously unknown which exists in the appid.sys AppLocker driver. This vulnerability has been assigned with CVE-2024-21338 and has been addressed by Microsoft on their February patch. Once established, threat actors […]


The post Lazarus Hackers Exploited Windows kernel 0-day In The Wild appeared first on Cyber Security News.

applocker cve cve-2024-21338 cyber security cyber-security-research driver escalation exploited exploiting february hackers kernel lazarus lazarus group microsoft microsoft vulnerability patch privilege privilege escalation threat threat group vulnerability windows windows kernel zero-day zero-day exploit

More from cybersecuritynews.com / Cyber Security News

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)