X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 13/Oct 10:08

Astaroth Trojan abuses GitHub to host configs and evade takedowns

The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee discovered a new Astaroth campaign using GitHub repositories to host malware configurations. This allows attackers to evade takedowns by pulling fresh configs from GitHub whenever C2 servers are shut down, ensuring […]

Articles similaires

Sorry! Image not available at this time

Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors

itsecuritynews.info - 18/Oct 14:32

  A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials,...

Sorry! Image not available at this time

Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors

itsecuritynews.info - 18/Oct 14:32

  A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials,...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 67

securityaffairs.co - 19/Oct 13:54

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware...

Sorry! Image not available at this time

New Herodotus Android malware fakes human typing to avoid detection

bleepingcomputer.com - 10:00

A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade...

Sorry! Image not available at this time

New Herodotus Android malware fakes human typing to avoid detection

bleepingcomputer.com - 10:00

A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade...

Sorry! Image not available at this time

Herodotus Android malware mimics human typing to evade detection

securityaffairs.co - 08:09

Threat Fabric researchers spotted Herodotus Android malware mimicking human typing with random delays to evade detection. Threat Fabric found a new...

Sorry! Image not available at this time

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer

itsecuritynews.info - 17:05

A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to deploy cryptocurrency mining...

Sorry! Image not available at this time

XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer

itsecuritynews.info - 17:05

A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to deploy cryptocurrency mining...

Sorry! Image not available at this time

New Red Teaming Tool RedTiger Attacking Gamers and Discord Accounts in the Wild

itsecuritynews.info - 24/Oct 15:35

RedTiger is an open-source red-teaming tool repurposed by attackers to steal sensitive data from Discord users and gamers. Released in 2025 on GitHub,...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...