X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 15/Jul 04:00

Dark Gate malware campaign uses Samba file shares

A Dark Gate malware campaign from March-April 2024 demonstrates how attackers exploit legitimate tools and services to distribute malware. Palo Alto Networks Unit 42 researchers shared details about a DarkGate malware campaign from March-April 2024. Threat actors used Microsoft Excel files to download a malicious software package from public-facing SMB file shares. The researchers pointed […]

Articles similaires

Sorry! Image not available at this time

Attackers Spread Lumma Stealer Malware GitHub Comments

itsecuritynews.info - 30/Aug 09:03

Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a growing...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

itsecuritynews.info - 30/Aug 15:32

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity,...

Sorry! Image not available at this time

Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign

itsecuritynews.info - 30/Aug 14:32

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity,...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Fake Palo Alto GlobalProtect used as lure to backdoor enterprises

bleepingcomputer.com - 29/Aug 18:29

Threat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and...