X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 20/Jun 17:46

UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on VMware ESXi virtual machines, allowing them to conduct credential theft, command execution, and lateral movement. [...]

Articles similaires

Sorry! Image not available at this time

New Eldorado Ransomware Targets Windows, VMware ESXi VMs

itsecuritynews.info - 06/Jul 07:09

Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types to prevent system damage....

Sorry! Image not available at this time

New Eldorado ransomware targets Windows, VMware ESXi VMs

bleepingcomputer.com - 05/Jul 15:56

A new ransomware-as-a-service (RaaS) called Eldorado emerged in March and comes with locker variants for VMware ESXi and Windows. [...]

Sorry! Image not available at this time

RegreSSHion Vulnerability Exposes Linux Systems to RCE Attacks

itsecuritynews.info - 03/Jul 15:34

Researchers revealed a signal handler race condition RegreSSHion vulnerability that puts OpenSSH servers at risk. The flaw is tracked as CVE-2024-6387...

Sorry! Image not available at this time

New attack uses MSC files and Windows XSS flaw to breach networks

bleepingcomputer.com - 24/Jun 19:03

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to...

Sorry! Image not available at this time

Critical unauthenticated remote code execution flaw in OpenSSH server

itsecuritynews.info - 01/Jul 15:09

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux...

Sorry! Image not available at this time

Critical unauthenticated remote code execution flaw in OpenSSH server

securityaffairs.co - 01/Jul 14:01

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code execution with root privileges in glibc-based Linux...

Harry Perkins Institute of Medical Research at the centre of major cyberattack by Medusa ransomware group

thewest.com.au - 03/Jul 08:03

Harry Perkins Institute of Medical Research is at the centre of a suspected major cyberattack, with hackers claiming to have stolen more than 4tb of...

Sorry! Image not available at this time

Data for ransom: Yours …

it-online.co.za - 25/Jun 08:50

The highest number of data compromises tracked by the Identity Theft Resource Center (ITRC) was 1 860, impacting around 300-million people in 2021....

Sorry! Image not available at this time

Fighting Crime: Kano State Police Command Parades 149 Suspects

itvradiong.com - 04/Jul 18:59

Police in Kano State have arrested 149 suspected Criminals for various offenses ranging from kidnapping, armed robbery to vehicle theft. Kano...

Sorry! Image not available at this time

Webinar Alert: Learn How ITDR Solutions Stop Sophisticated Identity Attacks

itsecuritynews.info - 05/Jul 13:32

Identity theft isn’t just about stolen credit cards anymore. Today, cybercriminals are using advanced tactics to infiltrate organizations and cause...