ighlights Introduction While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes have drawn increasing attention in recent years. As Windows security continues to evolve, it has become more challenging for attackers to execute malicious code without being detected. As a result, the attackers often aim to […]
First seen on research.checkpoint.com
Jump to article: research.checkpoint.com/2025/large-scale-exploitation-of-legacy-driver/
![]()

