X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 11/Dec 17:00

Russian Turla hackers hit Starlink-connected devices in Ukraine

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink. [...]

Articles similaires

Sorry! Image not available at this time

Russian Turla hackers hit Starlink-connected devices in Ukraine

bleepingcomputer.com - 11/Dec 17:00

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices...

Sorry! Image not available at this time

Secret Blizzard Targets Ukrainian Military with Custom Malware

itsecuritynews.info - 11/Dec 17:02

Microsoft detailed how Russian espionage group Secret Blizzard is leveraging infrastructure of other threat actors to target the Ukrainian military...

Sorry! Image not available at this time

Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor

securityaffairs.co - 12/Dec 08:50

Russia-linked APT group Secret Blizzard is using Amadey Malware-as-a-Service to infect systems in Ukraine with the Kazuar backdoor. The Russia-linked...

Sorry! Image not available at this time

Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor

securityaffairs.co - 12/Dec 08:50

Russia-linked APT group Secret Blizzard is using Amadey Malware-as-a-Service to infect systems in Ukraine with the Kazuar backdoor. The Russia-linked...

Sorry! Image not available at this time

Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service

itsecuritynews.info - 11/Dec 18:36

The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known...

Exploring Cyber-Darkness: How Moscow Undermines The West Via The Dark Web – Analysis

eurasiareview.com - 15/Dec 00:19

By Manucharian Grigoriy Russian hybrid warfare is an intricate field where elements of cyber and physical operations intertwine seamlessly....

Sorry! Image not available at this time

Russia-linked APT29 group used red team tools in rogue RDP attacks

securityaffairs.co - 18/Dec 22:24

Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October...

Sorry! Image not available at this time

Winnti hackers target other threat actors with new Glutton PHP backdoor

bleepingcomputer.com - 15/Dec 15:19

​The Chinese Winnti hacking group is using a new PHP backdoor named 'Glutton' in attacks on organizations in China and the U.S., and also in attacks...

Sorry! Image not available at this time

Winnti hackers target other threat actors with new Glutton PHP backdoor

bleepingcomputer.com - 15/Dec 15:19

​The Chinese Winnti hacking group is using a new PHP backdoor named 'Glutton' in attacks on organizations in China and the U.S., and also in attacks...

Sorry! Image not available at this time

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael

securityaffairs.co - 14/Dec 21:37

Iran-linked threat actors target IoT and OT/SCADA systems in US and Israeli infrastructure with IOCONTROL malware. Claroty’s Team82 obtained a...