X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 16/01/2025 10:59

MikroTik botnet relies on DNS misconfiguration to spread malware

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]

Articles similaires

Sorry! Image not available at this time

Researchers Breach StealC Infrastructure, Access Malware Control Panels

itsecuritynews.info - 17/Jan 05:32

Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. Security researchers recently...

Sorry! Image not available at this time

Critical XSS Vulnerabilities in Meta Conversion API Enable Zero-Click Account Takeover

itsecuritynews.info - 17/Jan 07:06

Security researchers have uncovered two critical cross-site scripting (XSS) vulnerabilities in Meta’s Conversions API Gateway that could enable...

Sorry! Image not available at this time

PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion

securityaffairs.co - 20/Jan 21:17

Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it. Resecurity has...

Sorry! Image not available at this time

PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion

securityaffairs.co - 20/Jan 21:17

Threat actors use PDFSIDER malware with social engineering and DLL sideloading to bypass AV/EDR, and ransomware gangs already abuse it. Resecurity has...

Sorry! Image not available at this time

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

itsecuritynews.info - 20/Jan 05:16

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access...

Sorry! Image not available at this time

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

itsecuritynews.info - 20/Jan 05:16

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access...

Sorry! Image not available at this time

New China Linked VoidLink Linux Malware Targets Major Cloud Providers

itsecuritynews.info - 14/Jan 19:06

Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this...

Sorry! Image not available at this time

GhostPoster Malware Campaign Exposes Browser Extension Risks

itsecuritynews.info - 17/Jan 12:31

  A stealthy malware operation has been discovered by cybersecurity researchers, which remained undetected for a period of up to five years and...

Sorry! Image not available at this time

Google Vertex AI Flaw Lets Low-Privilege Users Escalate to Service Agent Roles

itsecuritynews.info - 17/Jan 13:32

Security researchers have discovered critical privilege escalation vulnerabilities in Google’s Vertex AI platform that allow attackers with minimal...

Sorry! Image not available at this time

Google Gemini Flaw Allows Access to Private Meeting Details Through Calendar Events

itsecuritynews.info - 20/Jan 05:16

A harmless-looking Google Calendar invite has revealed a new frontier in the exploitation of artificial intelligence (AI).  Security researchers at...