Bring-your-own-vulnerable-driver (BYOVD) attacks are surging, with ransomware groups exploiting Windows kernel drivers to kill EDR and security processes before deploying payloads. A key loophole allows drivers signed before July 29, 2015 — even those with expired or revoked certificates — to load on modern Windows systems due

9m read time From darkreading.com
Post cover image
Table of contents
Security Gaps Allow BYOVD Attacks to ThriveVulnerable Driver Blocklists Only Go So FarShort-Term Fixes for the Long-Term BYOVD Problem

Sort: