X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 28/Feb 06:32

The SOC files: Chasing the web shell

Kaspersky SOC analysts discuss a recent incident where the well-known Behinder web shell was used as a post-exploitation backdoor, showing how web shells have evolved. This article has been indexed from Securelist Read the original article: The SOC files: Chasing…

Articles similaires

Sorry! Image not available at this time

Managed detection and response in 2024

itsecuritynews.info - 20/Feb 08:11

The Kaspersky Managed Detection and Response report includes trends and statistics based on incidents identified and mitigated by Kaspersky’s SOC...

Sorry! Image not available at this time

Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab

itsecuritynews.info - 28/Feb 20:32

One of the most notorious providers of abuse-friendly “bulletproof” web hosting for cybercriminals has started routing its operations through...

Sorry! Image not available at this time

Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation

itsecuritynews.info - 28/Feb 21:02

Microsoft exposes Storm-2139, a cybercrime network exploiting Azure AI via LLMjacking. Learn how stolen API keys enabled harmful… This article has...

Sorry! Image not available at this time

Broadcom urges VMware customers to patch ‘emergency’ zero-day bugs under active exploitation

itsecuritynews.info - 05/Mar 15:05

Security experts warn of ‘huge impact’ of actively exploited hypervisor flaws that allow sandbox escape © 2024 TechCrunch. All rights reserved....

Sorry! Image not available at this time

Microsoft Cancels Data Centre Leases In AI Shift

itsecuritynews.info - 25/Feb 09:32

Analysts say Microsoft has cancelled data centre leases in US, scaled back international spending in shift on AI expansion plans This article has been...

Sorry! Image not available at this time

Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos

itsecuritynews.info - 21/Feb 14:31

Chinese threat actor Salt Typhoon used JumbledPath, a custom-built utility, to gain access to a remote Cisco device, said the network provider This...

Sorry! Image not available at this time

Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature

itsecuritynews.info - 28/Feb 19:31

1 in 3 entries are used to extort civilians, says new paper Fresh research suggests attackers are actively monitoring databases of vulnerabilities...

Sorry! Image not available at this time

PolarEdge: Unveiling an uncovered IOT Botnet

itsecuritynews.info - 25/Feb 09:02

This blog post analyzes the PolarEdge backdoor and its associated botnet, offering insights into the adversary’s infrastructure. La publication...

Shrimp shells could help deliver medicine in space

knowridge.com - 01:15

Scientists are exploring a new way to deliver medicine in space using chitosan, a material made from shrimp shells. Chitosan is already used on Earth...

DOJ releases ‘The Epstein Files: Phase 1’ (READ FULL)

rt.com - 28/Feb 00:38

The Department of Justice has released the first phase of documents related to Jeffrey Epstein, which includes mostly previously known files Read...