X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 09/01/2025 16:11

Ivanti zero-day attacks infected devices with custom malware

Hackers exploiting the critical Ivanti Connect Secure zero-day vulnerability disclosed yesterday installed on compromised VPN appliances new malware called 'Dryhook' and 'Phasejam' that is not currently associated with any threat group. [...]

Articles similaires

Sorry! Image not available at this time

CISA gives feds four days to patch Ivanti flaw exploited as zero-day

bleepingcomputer.com - 08/May 12:16

CISA has given U.S. federal agencies four days to secure their networks against a high-severity vulnerability in Ivanti Endpoint Manager Mobile...

Sorry! Image not available at this time

Hackers Breach Government and Military Servers by Exploiting cPanel Vulnerability

itsecuritynews.info - 02/May 17:04

A sophisticated adversarial campaign targeting South-East Asian government and military infrastructure, combining rapid exploitation of a critical...

Sorry! Image not available at this time

Ivanti warns of new EPMM flaw exploited in zero-day attacks

bleepingcomputer.com - 07/May 15:20

Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day...

Sorry! Image not available at this time

Palo Alto Networks firewall zero-day exploited for nearly a month

bleepingcomputer.com - 07/May 10:57

Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day...

Sorry! Image not available at this time

Palo Alto Networks firewall zero-day exploited for nearly a month

bleepingcomputer.com - 07/May 10:57

Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day...

Sorry! Image not available at this time

Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits

securityaffairs.co - 11/May 14:06

Google says hackers now use AI to create exploits, automate attacks, evade defenses, and target AI supply chains at scale. Artificial intelligence is...

Sorry! Image not available at this time

CISA orders feds to patch Windows flaw exploited as zero-day

bleepingcomputer.com - 29/Apr 10:29

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability...

Sorry! Image not available at this time

CISA orders feds to patch Windows flaw exploited as zero-day

bleepingcomputer.com - 29/Apr 10:29

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to secure their Windows systems against a vulnerability...

Sorry! Image not available at this time

CISA says ‘Copy Fail’ flaw now exploited to root Linux systems

bleepingcomputer.com - 04/May 11:28

CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day after Theori...

Sorry! Image not available at this time

CISA says ‘Copy Fail’ flaw now exploited to root Linux systems

bleepingcomputer.com - 04/May 11:28

CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day after Theori...