Security News > 2022 > December > S3 Ep113: Pwning the Windows kernel – the crooks who hoodwinked Microsoft [Audio + Text]
Microsoft now has an advisory out that's blaming rogue partners.
The problem with certified kernel drivers, of course, is because they have to be signed by Microsoft, and because driver signing is compulsory on Windows, it means that if you can get your kernel driver signed, you don't need hacks or vulnerabilities or exploits to be able to load one as part of a cyberattack.
Obviously, that's the kind of thing that makes a cyberattack that's already bad news into something very, very much worse.
Apple pushes out iOS security update that's more tight-lipped than ever.
Now, apparently, the exploit that was found only worked on iOS. That's presumably why Apple didn't rush out updates for all the other platforms, although macOS, tvOS, iPadOS they all actually contained that bug.
DUCK. Just a reminder that you need to think about what's on the other side of the secure wall, because "Out of sight is very definitely not necessarily out of mind."
News URL
Related news
- Lazarus hackers exploited Windows zero-day to gain Kernel privileges (source)
- Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks (source)
- Microsoft rolls back decision to stop Windows 11 22H2 preview updates (source)
- Windows Kernel bug fixed last month exploited as zero-day since August (source)
- Microsoft: Windows 11 “invites” coming to more Windows 10 Pro PCs (source)
- Microsoft is killing off the Android apps in Windows 11 feature (source)
- Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability (source)
- Microsoft says Windows 10 21H2 support is ending in June (source)
- March 2024 Patch Tuesday: Microsoft fixes critical bugs in Windows Hyper-V (source)
- Microsoft again bothers Chrome users with Bing popup ads in Windows (source)