X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 19/Jun 15:33

Chinese Cyber Espionage Group Exploits Fortinet, Ivanti and VMware Zero-Days

The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. “Persistence mechanisms encompassed network devices,…

Articles similaires

Sorry! Image not available at this time

Experts observed approximately 120 malicious campaigns using the Rafel RAT

securityaffairs.co - 24/Jun 13:15

Multiple threat actors are using an open-source Android remote administration tool called Rafel RAT to target Android Devices. Check Point Research...

Sorry! Image not available at this time

China-linked spies target Asian Telcos since at least 2021

securityaffairs.co - 20/Jun 14:31

A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. The Symantec Threat Hunter Team...

Sorry! Image not available at this time

16-31 March 2024 Cyber Attacks Timeline

itsecuritynews.info - 28/Jun 09:32

In the second timeline of March 2024 I collected 104 events dominated by malware, exploitation of vulnerabilities and ransomware. The threat landscape...

Sorry! Image not available at this time

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

itsecuritynews.info - 24/Jun 05:33

Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet...

Sorry! Image not available at this time

China-linked spies target Asian Telcos since at least 2021

itsecuritynews.info - 20/Jun 15:34

A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. The Symantec Threat Hunter Team...

Sorry! Image not available at this time

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration

itsecuritynews.info - 20/Jun 08:33

A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of...

Sorry! Image not available at this time

Zero-Day Exploits Cheat Sheet: Definition, Examples & How It Works

itsecuritynews.info - 21/Jun 19:08

Zero-day exploits use unknown vulnerabilities to infiltrate PCs, networks, mobile phones and IoT devices. For unprepared security teams, these...

Sorry! Image not available at this time

RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

itsecuritynews.info - 24/Jun 08:34

A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and...

Sorry! Image not available at this time

Decade-Long Cyber Assault on Asian Telecoms Traced to Chinese State Hackers

itsecuritynews.info - 20/Jun 18:08

A years-long espionage campaign has targeted telecoms companies in Asia with tools associated with Chinese groups. The post Decade-Long Cyber Assault...

Sorry! Image not available at this time

Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign

itsecuritynews.info - 21/Jun 15:05

A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign primarily targeting government...