X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 20/Jun 17:46

UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on VMware ESXi virtual machines, allowing them to conduct credential theft, command execution, and lateral movement. [...]

Articles similaires

Sorry! Image not available at this time

Linux version of RansomHub ransomware targets VMware ESXi VMs

bleepingcomputer.com - 20/Jun 19:00

The RansomHub ransomware operation is using a Linux encryptor designed specifically to encrypt VMware ESXi environments in corporate attacks. [...]

Sorry! Image not available at this time

Experts found a bug in the Linux version of RansomHub ransomware

itsecuritynews.info - 22/Jun 10:33

The RansomHub ransomware operators added a Linux encryptor to their arsenal, the version targets VMware ESXi environments. RansomHub ransomware...

Sorry! Image not available at this time

RansomHub Ransomware Targets VMware ESXi Environments with Specialized Encryptor

itsecuritynews.info - 22/Jun 16:33

  The RansomHub ransomware operation is now employing a Linux encryptor specifically designed to target VMware ESXi environments during corporate...

Sorry! Image not available at this time

Experts found a bug in the Linux version of RansomHub ransomware

securityaffairs.co - 22/Jun 09:45

The RansomHub ransomware operators added a Linux encryptor to their arsenal, the version targets VMware ESXi environments. RansomHub ransomware...

Sorry! Image not available at this time

RegreSSHion Vulnerability Exposes Linux Systems to RCE Attacks

itsecuritynews.info - 03/Jul 15:34

Researchers revealed a signal handler race condition RegreSSHion vulnerability that puts OpenSSH servers at risk. The flaw is tracked as CVE-2024-6387...

Sorry! Image not available at this time

New attack uses MSC files and Windows XSS flaw to breach networks

bleepingcomputer.com - 24/Jun 19:03

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to...

Sorry! Image not available at this time

Critical unauthenticated remote code execution flaw in OpenSSH server

itsecuritynews.info - 01/Jul 15:09

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux...

Sorry! Image not available at this time

Critical unauthenticated remote code execution flaw in OpenSSH server

securityaffairs.co - 01/Jul 14:01

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux...

Harry Perkins Institute of Medical Research at the centre of major cyberattack by Medusa ransomware group

thewest.com.au - 03/Jul 08:03

Harry Perkins Institute of Medical Research is at the centre of a suspected major cyberattack, with hackers claiming to have stolen more than 4tb of...

Sorry! Image not available at this time

Data for ransom: Yours …

it-online.co.za - 25/Jun 08:50

The highest number of data compromises tracked by the Identity Theft Resource Center (ITRC) was 1 860, impacting around 300-million people in 2021....