Defender Turns Traitor: New 'RedSun' Zero-Day Hands F
0
0
er's own cloud-tagged file remediation process—using oplocks and directory junctions—to trick the antivirus into writing a malicious payload directly into C:WindowsSystem32, granting NT AUTHORITYSYSTEM privileges from a standard user account with no UAC prompt or password required.
er LPE (CVE-2026-33825),
...

