March 1, 2024, 8:12 a.m. | Eswar

Cyber Security News cybersecuritynews.com

The Lazarus threat group has been exploiting a Microsoft vulnerability associated with Windows Kernel Privilege Escalation to establish a kernel-level read/write primitive. This vulnerability was previously unknown which exists in the appid.sys AppLocker driver. This vulnerability has been assigned with CVE-2024-21338 and has been addressed by Microsoft on their February patch. Once established, threat actors […]


The post Lazarus Hackers Exploited Windows kernel 0-day In The Wild appeared first on Cyber Security News.

applocker cve cve-2024-21338 cyber security cyber-security-research driver escalation exploited exploiting february hackers kernel lazarus lazarus group microsoft microsoft vulnerability patch privilege privilege escalation threat threat group vulnerability windows windows kernel zero-day zero-day exploit

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA