Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation
Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a technique known as “Legacy Driver Exploitation.” This method involves using vulnerable…