all InfoSec news
Lazarus Group Exploits Windows AppLocker Driver Zero-Day
March 1, 2024, 1:21 a.m. |
GovInfoSecurity.com RSS Syndication www.govinfosecurity.com
North Korea's Lazarus hackers exploited a Windows AppLocker driver zero-day to gain kernel-level access and turn off security tools that could detect the group's bring-your-own-vulnerable-driver exploitation techniques. Microsoft fixed the bug in its February patch dump.
access applocker bug detect driver exploitation exploitation techniques exploited exploits february hackers kernel korea lazarus lazarus group microsoft north north korean own patch security security tools techniques tools turn vulnerable windows zero-day
More from www.govinfosecurity.com / GovInfoSecurity.com RSS Syndication
Microsoft Releases New-Open Source Tool for OT Security
1 day, 14 hours ago |
www.govinfosecurity.com
Rubrik Execs on How Going Public Will Drive More Innovation
1 day, 15 hours ago |
www.govinfosecurity.com
FTC Finalizes Health Breach Notification Rule Update
1 day, 15 hours ago |
www.govinfosecurity.com
Health Analytics Firm Reports Breach Affecting 1.1 Million
1 day, 20 hours ago |
www.govinfosecurity.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Officer Hospital Laguna Beach
@ Allied Universal | Laguna Beach, CA, United States
Sr. Cloud DevSecOps Engineer
@ Oracle | NOIDA, UTTAR PRADESH, India
Cloud Operations Security Engineer
@ Elekta | Crawley - Cornerstone
Cybersecurity – Senior Information System Security Manager (ISSM)
@ Boeing | USA - Seal Beach, CA
Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas
@ Goldman Sachs | Dallas, Texas, United States