X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 18/Feb 18:00

Chinese hackers abuse Microsoft APP-v tool to evade antivirus

The Chinese APT hacking group "Mustang Panda" has been spotted abusing the Microsoft Application Virtualization Injector utility as a LOLBIN to inject malicious payloads into legitimate processes to evade detection by antivirus software. [...]

Articles similaires

Sorry! Image not available at this time

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection

itsecuritynews.info - 18/Feb 01:04

Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads,...

Sorry! Image not available at this time

Hackers Compromising IIS Servers to Deploy BadIIS Malware

itsecuritynews.info - 09/Feb 07:09

A widespread campaign targeting Microsoft Internet Information Services (IIS) servers to deploy the BadIIS malware, a tool used for search engine...

Sorry! Image not available at this time

Chinese hackers use custom malware to spy on US telecom networks

bleepingcomputer.com - 20/Feb 16:11

The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially...

Sorry! Image not available at this time

Mustang Panda Exploits Windows GUI Vulnerability

thecyberthrone.in - 14/Feb 01:07

A recently discovered vulnerability in the Microsoft Windows GUI (Graphical User Interface) is being actively exploited by the Mustang Panda threat...

Sorry! Image not available at this time

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

itsecuritynews.info - 08/Feb 07:02

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of...

Sorry! Image not available at this time

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

itsecuritynews.info - 20/Feb 17:32

China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. The post...

Sorry! Image not available at this time

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access

itsecuritynews.info - 17/Feb 07:06

In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372 has been leveraging Microsoft Teams meeting invites to execute...

Sorry! Image not available at this time

Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos

itsecuritynews.info - 21/Feb 14:31

Chinese threat actor Salt Typhoon used JumbledPath, a custom-built utility, to gain access to a remote Cisco device, said the network provider This...

Man jailed for 5½ years for sexually abusing younger sister

the irish times - 14/Feb 17:16

Man used ‘almost every opportunity’ to abuse sister, judge says

Five Myths About The Corporate Transparency Act – Analysis

eurasiareview.com - 13/Feb 01:37

By Nate Sibley The bipartisan Corporate Transparency Act (CTA), passed in 2021 during the first Trump administration, mandated the creation of the...