Trellix Advanced Research Center has discovered a malware campaign using Avast’s Anti-Rootkit driver to seize control of systems. The driver is manipulated to disable protection measures using the exploitation of kernel-mode drivers, a rising threat. The malware is dropped into an unseen directory, registered under an alias and set as a service. It is then able to intercept antivirus and other processes, disabling them. Experts recommend implementing measures against such attacks, auditing and updating drivers periodically, and always proactively managing software security.

Nearly 250,000 Records From Tax Credit Consulting Agency Exposed
Summarize this content to a maximum of 60 words: Research has uncovered an unencrypted, non-password-protected database containing 245,949 records.