X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 08/Jan 23:39

New China-linked hackers breach telcos using edge device exploits

A sophisticated threat actor that uses Linux-based malware to target telecommunications providers has recently broadened its operations to include organizations in Southeastern Europe. [...]

Articles similaires

Sorry! Image not available at this time

New China Linked VoidLink Linux Malware Targets Major Cloud Providers

itsecuritynews.info - 14/Jan 19:06

Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere

itsecuritynews.info - 21/Jan 06:38

The Cybersecurity and Infrastructure Security Agency has issued a malware analysis report on BRICKSTORM, a sophisticated backdoor linked to Chinese...

Sorry! Image not available at this time

CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere

itsecuritynews.info - 21/Jan 06:38

The Cybersecurity and Infrastructure Security Agency has issued a malware analysis report on BRICKSTORM, a sophisticated backdoor linked to Chinese...

Sorry! Image not available at this time

Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure

itsecuritynews.info - 14/Jan 22:02

A sophisticated malware loader known as CastleLoader has emerged as a critical threat to US government agencies and critical infrastructure...

Sorry! Image not available at this time

VoidLink shows how one developer used AI to build a powerful Linux malware

securityaffairs.co - 21/Jan 08:25

VoidLink is a cloud-focused Linux malware, likely built by one person using AI, offering loaders, implants, rootkit evasion, and modular plugins....

Sorry! Image not available at this time

Researchers Gain Access to StealC Malware Command-and-Control Systems

itsecuritynews.info - 17/Jan 07:31

Security researchers successfully exploited vulnerabilities in the StealC malware infrastructure, gaining access to operator control panels and...

Sorry! Image not available at this time

StealC malware control panel flaw leaks details on active attacker

itsecuritynews.info - 19/Jan 15:34

Researchers uncovered an XSS flaw in StealC malware’s control panel, exposing key details about a threat actor using the info stealer. StealC is an...

Sorry! Image not available at this time

StealC malware control panel flaw leaks details on active attacker

itsecuritynews.info - 19/Jan 15:34

Researchers uncovered an XSS flaw in StealC malware’s control panel, exposing key details about a threat actor using the info stealer. StealC is an...