X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 09/Dec 15:24

Ransomware IAB abuses EDR for stealthy malware execution

An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks. [...]

Articles similaires

Sorry! Image not available at this time

Storm-0249 Abusing EDR Process Via Sideloading to Hide Malicious Activity

itsecuritynews.info - 15/Dec 11:33

Storm-0249, once known primarily as a mass phishing group, has undergone a significant transformation into a sophisticated initial access broker...

Sorry! Image not available at this time

Ransomware gangs turn to Shanya EXE packer to hide EDR killers

bleepingcomputer.com - 09/Dec 00:00

Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR (endpoint detection and...

Sorry! Image not available at this time

Ransomware gangs turn to Shanya EXE packer to hide EDR killers

bleepingcomputer.com - 09/Dec 00:00

Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR (endpoint detection and...

Sorry! Image not available at this time

North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks

bleepingcomputer.com - 09/Dec 15:43

A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence mechanisms and leverages Ethereum...

Sorry! Image not available at this time

Threat Actors Leveraging Matanbuchus Malicious Downloader to Ransomware and Establish Persistence

itsecuritynews.info - 03/Dec 09:32

Matanbuchus represents a significant threat in the cybercriminal landscape as a dangerous malware downloader written in C++. Since 2020, this tool has...

Sorry! Image not available at this time

Threat Actors Leveraging Matanbuchus Malicious Downloader to Ransomware and Establish Persistence

itsecuritynews.info - 03/Dec 09:32

Matanbuchus represents a significant threat in the cybercriminal landscape as a dangerous malware downloader written in C++. Since 2020, this tool has...

Sorry! Image not available at this time

Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots

itsecuritynews.info - 03/Dec 08:32

Morphisec announced an expansion of its Anti-Ransomware Assurance Suite, adding new capabilities that include Network Share Ransomware Protection for...

Sorry! Image not available at this time

Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots

itsecuritynews.info - 03/Dec 08:32

Morphisec announced an expansion of its Anti-Ransomware Assurance Suite, adding new capabilities that include Network Share Ransomware Protection for...

Sorry! Image not available at this time

New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

itsecuritynews.info - 13:03

A sophisticated proof-of-concept demonstrating how malware can bypass advanced call stack detection mechanisms increasingly adopted by enterprise...

Sorry! Image not available at this time

New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules

itsecuritynews.info - 13:03

A sophisticated proof-of-concept demonstrating how malware can bypass advanced call stack detection mechanisms increasingly adopted by enterprise...