April 24, 2024, 2:31 p.m. | David Jones

Cybersecurity Dive - Latest News www.cybersecuritydive.com

State-linked actors are using a custom tool for post exploitation activity of a vulnerability in Windows Print Spooler, which could result in credential theft and backdoor installs.

attack backdoor credential credential theft exploitation flaw golden gooseegg microsoft microsoft flaw print print spooler result state theft threat threat actors tool vintage vulnerability windows windows print spooler

More from www.cybersecuritydive.com / Cybersecurity Dive - Latest News

Head of Security Operations

@ Canonical Ltd. | Home based - Americas, EMEA

Security Specialist

@ Lely | Maassluis, Netherlands

Senior Cyber Incident Response (Hybrid)

@ SmartDev | Cầu Giấy, Vietnam

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom