When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Finally, Windows virtualization-based security was also disabled even when secured by UEFI locks.
This allowed Leviev to also disable security features such as Credential Guard and Hypervisor-Protected Code integrity.
According to Levievs knowledge, this is the first time VBSs UEFI locks have been bypassed without physical access.