X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 16/01/2025 10:59

MikroTik botnet relies on DNS misconfiguration to spread malware

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]

Articles similaires

Sorry! Image not available at this time

Claude Code leak used to push infostealer malware on GitHub

bleepingcomputer.com - 02/Apr 20:30

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware....

Sorry! Image not available at this time

Claude Code leak used to push infostealer malware on GitHub

bleepingcomputer.com - 02/Apr 20:30

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware....

Sorry! Image not available at this time

BIND 9 Security Flaws Allow Attackers to Bypass Security Controls and Crash Servers

itsecuritynews.info - 27/Mar 12:32

The Internet Systems Consortium (ISC) has released critical security advisories addressing three new vulnerabilities in the widely used BIND 9 Domain...

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

itsecuritynews.info - 02/Apr 18:20

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

itsecuritynews.info - 02/Apr 18:20

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

securityaffairs.co - 02/Apr 17:04

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware

itsecuritynews.info - 03/Apr 12:07

A botnet that has been running since 2011 is back in the spotlight — not because it is new, but because it keeps reinventing itself. Phorpiex, also...

Sorry! Image not available at this time

Critical ShareFile Flaws Lead to Unauthenticated RCE

itsecuritynews.info - 03/Apr 12:36

The vulnerabilities can be chained together to bypass authentication and upload arbitrary files to the server. The post Critical ShareFile Flaws Lead...