X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 10/Mar 10:00

APT28 hackers deploy customized variant of Covenant open-source tool

The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]

Articles similaires

Sorry! Image not available at this time

APT28 conducts long-term espionage on Ukrainian forces using custom malware

securityaffairs.co - 10/Mar 15:14

APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked...

Sorry! Image not available at this time

APT28 conducts long-term espionage on Ukrainian forces using custom malware

securityaffairs.co - 10/Mar 15:14

APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked...

Sorry! Image not available at this time

Russian hackers exploit Zimbra flaw in Ukrainian govt attacks

bleepingcomputer.com - 19/Mar 14:55

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration...

Sorry! Image not available at this time

Russian hackers exploit Zimbra flaw in Ukrainian govt attacks

bleepingcomputer.com - 19/Mar 14:55

Hackers part of APT28, a state-backed threat group linked to Russia's military intelligence service (GRU), are exploiting a Zimbra Collaboration...

Sorry! Image not available at this time

Threat actors use custom AuraInspector to harvest data from Salesforce systems

securityaffairs.co - 10/Mar 12:29

Attackers are mass-scanning Salesforce Experience Cloud sites using a modified AuraInspector tool to exploit misconfigurations and access sensitive...

Sorry! Image not available at this time

Threat actors use custom AuraInspector to harvest data from Salesforce systems

securityaffairs.co - 10/Mar 12:29

Attackers are mass-scanning Salesforce Experience Cloud sites using a modified AuraInspector tool to exploit misconfigurations and access sensitive...

Sorry! Image not available at this time

Betterleaks, a new open-source secrets scanner to replace Gitleaks

bleepingcomputer.com - 15/Mar 14:17

A new open-source tool called Betterleaks can scan directories, files, and git repositories and identify valid secrets using default or customized...

Sorry! Image not available at this time

Betterleaks, a new open-source secrets scanner to replace Gitleaks

bleepingcomputer.com - 15/Mar 14:17

A new open-source tool called Betterleaks can scan directories, files, and git repositories and identify valid secrets using default or customized...

Sorry! Image not available at this time

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

itsecuritynews.info - 16/Mar 19:34

The evolution of Iranian cyber operations in broad context: from custom wiper malware to misuse of legitimate admin tools and more. The post Iranian...

Sorry! Image not available at this time

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

itsecuritynews.info - 16/Mar 19:34

The evolution of Iranian cyber operations in broad context: from custom wiper malware to misuse of legitimate admin tools and more. The post Iranian...