X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 14/Feb 16:18

Chinese Threat Group conducting espionage found moonlighting with ransomware

For years, cyber threat actors have been launching attacks to spread malware and deploy tools for intelligence gathering, often driven by financial motives. However, a recent development has caught the attention of cybersecurity researchers—state-sponsored hackers assigned to espionage operations are…

Articles similaires

Sorry! Image not available at this time

Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware

itsecuritynews.info - 20/Feb 18:04

A sophisticated cyber espionage campaign linked to Chinese state-aligned threat actors has targeted organizations across 15 countries using an updated...

Sorry! Image not available at this time

Hackers Newly Registering Valentine’s Day Themed Domains for Stealthy Cyber Attacks

itsecuritynews.info - 11/Feb 17:09

Researchers have identified a surge in newly registered Valentine’s Day-themed domains, with threat actors leveraging terms like “love,”...

Sorry! Image not available at this time

Chinese espionage tools deployed in RA World ransomware attack

bleepingcomputer.com - 13/Feb 14:31

A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a...

Sorry! Image not available at this time

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

itsecuritynews.info - 20/Feb 17:32

China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. The post...

Sorry! Image not available at this time

Ransomware Tactics Evolve as Hackers Shift Focus to Data Theft

itsecuritynews.info - 17/Feb 17:06

  Ransomware groups are adapting their strategies to outsmart stronger cybersecurity defenses and increasing law enforcement pressure, according to...

Sorry! Image not available at this time

Kimsuky APT group used custom RDP Wrapper version and forceCopy stealer

securityaffairs.co - 08/Feb 18:15

Researchers spotted North Korea’s Kimsuky APT group launching spear-phishing attacks to deliver forceCopy info-stealer malware. Researchers from...

Sorry! Image not available at this time

Hackers Compromising IIS Servers to Deploy BadIIS Malware

itsecuritynews.info - 09/Feb 07:09

A widespread campaign targeting Microsoft Internet Information Services (IIS) servers to deploy the BadIIS malware, a tool used for search engine...

Sorry! Image not available at this time

China-linked APTs’ tool employed in RA World Ransomware attack

securityaffairs.co - 13/Feb 15:49

A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported...

Sorry! Image not available at this time

Kimsuky APT group used custom RDP Wrapper version and forceCopy stealer

itsecuritynews.info - 08/Feb 19:09

Researchers spotted North Korea’s Kimsuky APT group launching spear-phishing attacks to deliver forceCopy info-stealer malware. Researchers from...

Sorry! Image not available at this time

Crooks use Google Tag Manager skimmer to steal credit card data from a Magento-based e-stores

securityaffairs.co - 11/Feb 12:34

Sucuri researchers observed threat actors leveraging Google Tag Manager (GTM) to install e-skimmer software on Magento-based e-stores. Sucuri...