Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User
A novel lateral movement technique that exploits BitLocker’s Component Object Model (COM) functionality to execute malicious code on target systems....
Read more →