Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation

A sophisticated attack employing Legacy Driver Exploitation technique has emerged as a significant cybersecurity threat, according to a recent security report. The attack, first documented in June 2024 by CheckPoint-Research (CPR), primarily focuses on remotely controlling infected systems using GhOstRAT malware while evading detection mechanisms. The threat actors distribute malware through phishing sites and messaging […]

The post Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: