X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - Hier 20:05

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed "Zombie ZIP" helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products. [...]

Articles similaires

Sorry! Image not available at this time

New 'Zombie ZIP' technique lets malware slip past security tools

bleepingcomputer.com - 20:05

A new technique dubbed "Zombie ZIP" helps conceal payloads in compressed files specially created to avoid detection from security solutions such as...

Sorry! Image not available at this time

Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications

itsecuritynews.info - 25/Feb 21:07

A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control...

Sorry! Image not available at this time

Hackers Can Abuse Cortex XDR Live Terminal Feature for C2 Communications

itsecuritynews.info - 25/Feb 21:07

A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control...

America’s Largest Breach May Be a Warning: Incident Response Is the New Survival Metric

news.clearancejobs.com - 27/Feb 17:30

Security tools have improved, but companies without rapid response authority and transparent communication still collapse after major hacks.

America’s Largest Breach May Be a Warning: Incident Response Is the New Survival Metric

news.clearancejobs.com - 27/Feb 17:30

Security tools have improved, but companies without rapid response authority and transparent communication still collapse after major hacks.

Sorry! Image not available at this time

2026 Browser Data Reveals Major Enterprise Security Blind Spots

bleepingcomputer.com - 05/Mar 15:01

The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security....

Sorry! Image not available at this time

2026 Browser Data Reveals Major Enterprise Security Blind Spots

bleepingcomputer.com - 05/Mar 15:01

The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security....

Sorry! Image not available at this time

APT37 combines cloud storage and USB implants to infiltrate air-gapped systems

securityaffairs.co - 02/Mar 12:38

North Korea-linked APT 37 used Zoho WorkDrive and USB malware to breach air-gapped networks in the Ruby Jumper campaign. North Korean group ScarCruft...

Sorry! Image not available at this time

New ‘BlackSanta’ EDR killer spotted targeting HR departments

bleepingcomputer.com - 22:57

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named...

Sorry! Image not available at this time

New ‘BlackSanta’ EDR killer spotted targeting HR departments

bleepingcomputer.com - 22:57

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named...