X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - Hier 18:04

Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware

A sophisticated cyber espionage campaign linked to Chinese state-aligned threat actors has targeted organizations across 15 countries using an updated variant of the Shadowpad malware to deploy previously undocumented ransomware. The attacks, analyzed by Trend Micro’s incident response team, exploit…

Articles similaires

Sorry! Image not available at this time

Chinese Threat Group conducting espionage found moonlighting with ransomware

itsecuritynews.info - 14/Feb 16:18

For years, cyber threat actors have been launching attacks to spread malware and deploy tools for intelligence gathering, often driven by financial...

Sorry! Image not available at this time

NailaoLocker ransomware targets EU healthcare-related entities

securityaffairs.co - 15:47

NailaoLocker ransomware is a new threat that targeted European healthcare organizations from June to October 2024. Orange Cyberdefense CERT uncovered...

Sorry! Image not available at this time

Chinese espionage tools deployed in RA World ransomware attack

bleepingcomputer.com - 13/Feb 14:31

A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a...

Sorry! Image not available at this time

FinalDraft Malware Used in Campaigns by REF7707

thecyberthrone.in - 19/Feb 06:34

The FinalDraft malware has been linked to the notorious threat actor group REF7707. This group has conducted a sophisticated cyber-espionage campaign...

Sorry! Image not available at this time

Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers

bleepingcomputer.com - 07/Feb 18:42

Software vendor Trimble is warning that hackers are exploiting a Cityworks deserialization vulnerability to remotely execute commands on IIS servers...

Sorry! Image not available at this time

Threat Actors Exploiting DeepSeek’s Popularity To Deploy Malware

itsecuritynews.info - 13/Feb 13:05

The Chinese AI startup DeepSeek has gained significant attention in the global AI market with its open-source inference model, DeepSeek-R1. This model...

Sorry! Image not available at this time

Mustang Panda Exploits Windows GUI Vulnerability

thecyberthrone.in - 14/Feb 01:07

A recently discovered vulnerability in the Microsoft Windows GUI (Graphical User Interface) is being actively exploited by the Mustang Panda threat...

Sorry! Image not available at this time

Hackers Newly Registering Valentine’s Day Themed Domains for Stealthy Cyber Attacks

itsecuritynews.info - 11/Feb 17:09

Researchers have identified a surge in newly registered Valentine’s Day-themed domains, with threat actors leveraging terms like “love,”...

Sorry! Image not available at this time

Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware

itsecuritynews.info - 07/Feb 06:11

Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp’s Remote Monitoring and Management (RMM) software as a...

Sorry! Image not available at this time

Attackers exploit a new zero-day to hijack Fortinet firewalls

itsecuritynews.info - 12/Feb 00:13

Fortinet warned of attacks using a now-patched zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet firewalls. Fortinet warned that...