A sophisticated attack employing Legacy Driver Exploitation technique has emerged as a significant cybersecurity threat, according to a recent security report. The attack, first documented in June 2024 by CheckPoint-Research (CPR), primarily focuses on remotely controlling infected systems using GhOstRAT malware while evading detection mechanisms. The threat actors distribute malware through phishing sites and messaging […]
The post Threat Actors Exploiting Legacy Drivers to Bypass TLS Certificate Validation appeared first on Cyber Security News.
This article has been indexed from Cyber Security News