Nov. 2, 2023, 11:45 p.m. | SC Staff

SC Magazine feed for Strategy www.scmagazine.com

Threat actors could leverage 34 newly identified vulnerable Windows Driver Model and Windows Driver Framework drivers to facilitate system process manipulation, persistence, and total device takeovers without being detected by security software, according to SecurityWeek.

device driver drivers endpointdevice-security framework kernel kernel drivers manipulation persistence process security security software software system takeovers threat threat actors vulnerability management vulnerable windows windows driver

More from www.scmagazine.com / SC Magazine feed for Strategy

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA