When combined with Web threats, the new rootkit is proving to be both a destructive ... The malware then sits on the infected computer unbeknownst to the user, allowing attackers to infiltrate ...
In a detailed analysis of the exploit, Lazarus and the FudModule Rootkit, Jan Vojtěšek from ... attractive attack surface (such as standard user-to-kernel, or even sandbox-to-kernel ...