Downgrade attacks open patched systems to malware

A new report by the former SafeBreach researcher Alon Leviev is raising alarms about the risks posed by downgrade attacks on Microsoft Windows. In a blog post, Leviev, who now works for Microsoft, explained that his latest bypass could allow a malicious actor to load unsigned kernel drivers on a fully patched Windows system. Those could then be used to disable security features, deploy and disguise malicious code and processes, and so on. 

The post Downgrade attacks open patched systems to malware appeared first on Security Boulevard.

06 November 2024


>>More