X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 19/Mar 09:04

Hacker Weaponizing Hard Disk Image Files To Deliver VenomRAT

A sophisticated phishing campaign is leveraging virtual hard disk (.vhd) files to distribute the dangerous VenomRAT malware. The attack begins with purchase order-themed emails containing archive attachments that, when extracted, reveal hard disk image files designed to evade traditional security…

Articles similaires

Sorry! Image not available at this time

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

itsecuritynews.info - 24/Mar 09:36

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape. This malware is primarily delivered...

Sorry! Image not available at this time

SectopRAT as Weaponized Cloudflare Turnstile Challenge Attacks Windows Users

itsecuritynews.info - 26/Mar 18:12

A sophisticated new malware strain dubbed SectopRAT has emerged, leveraging Cloudflare’s Turnstile challenge system as part of its attack...

Sorry! Image not available at this time

SectopRAT as Weaponized Cloudflare Turnstile Challenge Attacks Windows Users

itsecuritynews.info - 26/Mar 18:12

A sophisticated new malware strain dubbed SectopRAT has emerged, leveraging Cloudflare’s Turnstile challenge system as part of its attack...

Sorry! Image not available at this time

New Python-Based Discord RAT Attacking Users to Steal Login Credentials

itsecuritynews.info - 28/Mar 18:11

A sophisticated Python-based Remote Access Trojan (RAT) leveraging Discord as its command and control infrastructure has been identified targeting...

Sorry! Image not available at this time

New Python-Based Discord RAT Attacking Users to Steal Login Credentials

itsecuritynews.info - 28/Mar 18:11

A sophisticated Python-based Remote Access Trojan (RAT) leveraging Discord as its command and control infrastructure has been identified targeting...

Sorry! Image not available at this time

Developers Beware! Fake Coding Challenges Will Deploy FogDoor on Your System

itsecuritynews.info - 25/Mar 08:17

A sophisticated malware campaign targeting software developers has emerged, leveraging fake coding challenges to infiltrate systems with a stealthy...

Sorry! Image not available at this time

Developers Beware! Fake Coding Challenges Will Deploy FogDoor on Your System

itsecuritynews.info - 25/Mar 08:17

A sophisticated malware campaign targeting software developers has emerged, leveraging fake coding challenges to infiltrate systems with a stealthy...

Sorry! Image not available at this time

New Android malware uses Microsoft’s .NET MAUI to evade detection

bleepingcomputer.com - 25/Mar 13:52

New Android malware campaigns use Microsoft's cross-platform framework .NET MAUI while disguising as legitimate services to evade detection. [...]