Feb. 29, 2024, 5:41 a.m. | Balaji

GBHackers On Security gbhackers.com

The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a critical level of system access. This vulnerability, identified as CVE-2024-21338, was found in the appid.Sys AppLocker driver was patched by Microsoft in their February Patch Tuesday update following a report from Avast Threat Labs. The […]


The post Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security …

access applocker computer security critical cve cve-2024-21338 cybercriminal cyber security driver exploited february found hackers hacks kernel kernel privileges lazarus lazarus group malware microsoft organization patch patch tuesday privileges report system tuesday update vulnerability well-known windows windows 0-day zero-day zero-day vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Network Security Engineer

@ Meta | Menlo Park, CA | Remote, US

Security Engineer, Investigations - i3

@ Meta | Washington, DC

Threat Investigator- Security Analyst

@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC

Security Operations Engineer II

@ Microsoft | Redmond, Washington, United States

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States