all InfoSec news
Lazarus Group Exploits Windows AppLocker Driver Zero-Day
March 1, 2024, 12:19 a.m. |
BankInfoSecurity.com RSS Syndication www.bankinfosecurity.com
North Korea's Lazarus hackers exploited a Windows AppLocker driver zero-day to gain kernel-level access and turn off security tools that could detect the group's bring-your-own-vulnerable-driver exploitation techniques. Microsoft fixed the bug in its February patch dump.
access applocker bug detect driver exploitation exploitation techniques exploited exploits february hackers kernel korea lazarus lazarus group microsoft north north korean own patch security security tools techniques tools turn vulnerable windows zero-day
More from www.bankinfosecurity.com / BankInfoSecurity.com RSS Syndication
Microsoft Releases New-Open Source Tool for OT Security
1 day, 11 hours ago |
www.bankinfosecurity.com
Rubrik Execs on How Going Public Will Drive More Innovation
1 day, 12 hours ago |
www.bankinfosecurity.com
FTC Finalizes Health Breach Notification Rule Update
1 day, 12 hours ago |
www.bankinfosecurity.com
Health Analytics Firm Reports Breach Affecting 1.1 Million
1 day, 17 hours ago |
www.bankinfosecurity.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Associate Principal Security Engineer
@ Activision Blizzard | Work from Home - CA
Security Engineer- Systems Integration
@ Meta | Bellevue, WA | Menlo Park, CA | New York City
Lead Security Engineer (Digital Forensic and IR Analyst)
@ Blue Yonder | Hyderabad
Senior Principal IAM Engineering Program Manager Cybersecurity
@ Providence | Redmond, WA, United States
Information Security Analyst II or III
@ Entergy | The Woodlands, Texas, United States