Become a Patron!

Malware writers exploit recent Windows Task Scheduler 0-day vulnerability

VUBot

Staff member
Diamond Contributor
ECF Refugee
Vape Media
It's a little over a week since a vulnerability in the Windows Task Scheduler was revealed. A patch for the 0-day has been released by third party security firm 0patch, but there's bad news for anyone who hasn't secure their system against the security threat -- malware writers are already taking advantage of the flaw. The exploit was partly facilitated by the fact that the source code for a proof-of-concept exploit for the ALPC LPE vulnerability -- as well as a binary -- was published on GitHub. Now a group that has been named PowerPool has been spotted using the… [Continue Reading]

Vs5fBvYQ_1w


Continue reading...
 

VU Sponsors

Top