all InfoSec news
Lazarus APT exploited zero-day in Windows driver to gain kernel privileges
Feb. 29, 2024, 8:11 a.m. | Pierluigi Paganini
Security Affairs securityaffairs.co
access admin applocker apt apt group avast breaking news cve cve-2024-21338 driver exploit exploited flaw hacking information security news it information security kernel kernel privileges korea lazarus lazarus apt lazarus apt group malware north north korea pierluigi paganini privileges researchers rootkit systems target vulnerability windows windows driver zero-day zero-day flaw zero-day vulnerability
More from securityaffairs.co / Security Affairs
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Officer Hospital Laguna Beach
@ Allied Universal | Laguna Beach, CA, United States
Sr. Cloud DevSecOps Engineer
@ Oracle | NOIDA, UTTAR PRADESH, India
Cloud Operations Security Engineer
@ Elekta | Crawley - Cornerstone
Cybersecurity – Senior Information System Security Manager (ISSM)
@ Boeing | USA - Seal Beach, CA
Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas
@ Goldman Sachs | Dallas, Texas, United States