X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 03/Mar 00:06

CyberStrikeAI tool adopted by hackers for AI-powered attacks

Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet FortiGate firewalls. [...]

Articles similaires

Sorry! Image not available at this time

Botnet Moves to Blockchain, Evades Traditional Takedowns

itsecuritynews.info - 01/Mar 17:36

  A newly identified botnet loader is challenging long standing methods used to dismantle cybercrime infrastructure. Security researchers have...

Sorry! Image not available at this time

Botnet Moves to Blockchain, Evades Traditional Takedowns

itsecuritynews.info - 01/Mar 17:36

  A newly identified botnet loader is challenging long standing methods used to dismantle cybercrime infrastructure. Security researchers have...

Sorry! Image not available at this time

China Based Hackers Attack Telco With New Malware

itsecuritynews.info - 07/Mar 18:15

A China-based advanced persistent cyber criminal tracked as UAT-9244 has been attacking telecommunication service providers in South America since...

Sorry! Image not available at this time

China Based Hackers Attack Telco With New Malware

itsecuritynews.info - 07/Mar 18:15

A China-based advanced persistent cyber criminal tracked as UAT-9244 has been attacking telecommunication service providers in South America since...

Sorry! Image not available at this time

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

itsecuritynews.info - 18:34

Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a...

Sorry! Image not available at this time

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

itsecuritynews.info - 09/Mar 08:02

High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a years-long campaign. The...

Sorry! Image not available at this time

Attackers exploit FortiGate devices to access sensitive network information

securityaffairs.co - 10/Mar 19:02

Attackers are exploiting FortiGate devices to breach networks and steal configuration data containing service account credentials and network details....

Sorry! Image not available at this time

Attackers exploit FortiGate devices to access sensitive network information

securityaffairs.co - 10/Mar 19:02

Attackers are exploiting FortiGate devices to breach networks and steal configuration data containing service account credentials and network details....

Sorry! Image not available at this time

Microsoft Report Reveals Hackers Exploit AI In Cyberattacks

itsecuritynews.info - 08/Mar 15:11

According to Microsoft, hackers are increasingly using AI in their work to increase attacks, scale cyberattack activity, and limit technical barriers...

Sorry! Image not available at this time

Microsoft Report Reveals Hackers Exploit AI In Cyberattacks

itsecuritynews.info - 08/Mar 15:11

According to Microsoft, hackers are increasingly using AI in their work to increase attacks, scale cyberattack activity, and limit technical barriers...