X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 11/07/2024 20:45

CrystalRay operations have scaled 10x to over 1,500 victims

A threat actor known as CrystalRay targeted 1,500 victims since February using tools like SSH-Snake and various open-source utilities. The Sysdig Threat Research Team (TRT) first spotted the threat actor CrystalRay on February 2024 and observed it using the SSH-Snake open-source software penetration testing tool. The experts collected new evidence that revealed that the threat actor expanded its operations. […]

Articles similaires

Sorry! Image not available at this time

AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems

itsecuritynews.info - 31/Jan 10:31

AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single...

Sorry! Image not available at this time

AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems

itsecuritynews.info - 31/Jan 10:31

AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single...

Sorry! Image not available at this time

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

itsecuritynews.info - 26/Jan 09:36

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target...

Sorry! Image not available at this time

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

itsecuritynews.info - 26/Jan 09:36

The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target...

Sorry! Image not available at this time

Novel Technique to Detect Cloud Threat Actor Operations

itsecuritynews.info - 23:18

We introduce a novel method that maps cloud alert trends to MITRE ATT&CK techniques. The patterns created could identify threat actors by behavior....

Sorry! Image not available at this time

Threat Actors Using AI Generated Malicious Job Offers to Deploy PureRAT

itsecuritynews.info - 29/Jan 12:07

A Vietnamese cybercrime group is using artificial intelligence to write malicious code in an ongoing phishing campaign that distributes the PureRAT...

Sorry! Image not available at this time

BlackIce – A Container Based Red Teaming Toolkit for AI Security Testing

itsecuritynews.info - 29/Jan 12:07

Databricks has officially announced the release of BlackIce, an open-source, containerized toolkit designed to streamline AI security testing and Red...

Sorry! Image not available at this time

AI-powered penetration testing: Definition, Tools and Process

itsecuritynews.info - 31/Jan 23:16

AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents...

NAPTIP Uncovers Alleged Human Trafficking Ring in Onitsha, Arrests Six, Rescues 17 Victims

spyetv.com.ng - 03/Feb 13:39

The National Agency for the Prohibition of Trafficking in Persons (NAPTIP) has uncovered an alleged human trafficking operation following a...

Sorry! Image not available at this time

Taiwan unveils 20-qubit superconducting quantum computer built entirely in-house

wn.com - 30/Jan 22:55

Researchers at Academia Sinica have developed a 20-qubit superconducting quantum computer, marking Taiwan’s entry into large-scale quantum chip...