March 1, 2024, 1:21 a.m. |

GovInfoSecurity.com RSS Syndication www.govinfosecurity.com

Microsoft Fixed Bug in February That Gave Kernel-Level Access to North Korean APT
North Korea's Lazarus hackers exploited a Windows AppLocker driver zero-day to gain kernel-level access and turn off security tools that could detect the group's bring-your-own-vulnerable-driver exploitation techniques. Microsoft fixed the bug in its February patch dump.

access applocker bug detect driver exploitation exploitation techniques exploited exploits february hackers kernel korea lazarus lazarus group microsoft north north korean own patch security security tools techniques tools turn vulnerable windows zero-day

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States