Check Point Research (CPR) has uncovered a sophisticated cyber campaign exploiting a Windows driver signing policy loophole to disable security tools and deploy malware across thousands of systems since June 2024. Attackers leveraged 2,500+ modified variants of the vulnerable Truesight.sys driver (v2.0.2) – part of Adlice’s RogueKiller Antirootkit – to terminate protected processes like EDR/AV […]
The post Silent Killers Exploiting Windows Policy Loophole To Evade Detections & Deploy Malware appeared first on Cyber Security News.
This article has been indexed from Cyber Security News