X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 03/Jul 14:32

Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure

In the early part of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a significant threat utilizing the drive-by download technique to spread malware. This article has been indexed from Cyware News – Latest Cyber News…

Articles similaires

Sorry! Image not available at this time

Exploring Fake-Bat Loaders: Distribution Tactics and Cybercrime Networks

itsecuritynews.info - 03/Jul 15:34

  There has been a significant increase in the number of threats exploiting the drive-by-download method during the first half of 2024, such as the...

Sorry! Image not available at this time

New Unfurling Hemlock Threat Actor Floods Systems with Malware

itsecuritynews.info - 28/Jun 16:32

Unfurling Hemlock is using a new method, referred to as a “malware cluster bomb,” which allows the threat actor to use one malware sample to...

Sorry! Image not available at this time

How Hacked YouTube Channels Spread Scams and Malware

itsecuritynews.info - 02/Jul 13:09

The most common attack methods against YouTube channels involve phishing attacks to steal login credentials, exploiting weak or reused passwords, and...

Sorry! Image not available at this time

WhisperGate Data-Wiping Malware Suspect Indicted

itsecuritynews.info - 28/Jun 10:32

The US Department of Justice has indicted a 22-year-old Russian, Amin Timovich Stigal, for his alleged involvement in cyber attacks on Ukrainian...

Sorry! Image not available at this time

Chinese Cyberspies Employ Ransomware in Attacks for Diversion

itsecuritynews.info - 27/Jun 08:12

The adoption of ransomware in cyberespionage attacks helps adversaries blur the lines between APT and cybercriminal activity, leading to potential...

Sorry! Image not available at this time

Chinese Cyberspies Employ Ransomware in Attacks for Diversion

itsecuritynews.info - 27/Jun 08:12

The adoption of ransomware in cyberespionage attacks helps adversaries blur the lines between APT and cybercriminal activity, leading to potential...

Sorry! Image not available at this time

Turla: A Master of Deception

itsecuritynews.info - 05/Jul 09:04

The Turla malware has been found using weaponized LNK files to infect computers. The malware leverages a compromised website to distribute malicious...

Sorry! Image not available at this time

Cyber Insurance Terms Drive Companies To Invest More in Security, Report Finds

itsecuritynews.info - 28/Jun 10:09

Approximately three-quarters of companies have made investments in cyber defense in order to qualify for cyber insurance, according to a report by...

Sorry! Image not available at this time

China-Sponsored Attackers Target 40K Corporate Users in 90 Days

itsecuritynews.info - 29/Jun 04:32

The campaigns, named LegalQloud, Eqooqp, and Boomer, deploy highly evasive and adaptive threat (HEAT) attack techniques that can bypass multifactor...

Sorry! Image not available at this time

Web Scraping is Not Just a Security or Fraud Problem

itsecuritynews.info - 01/Jul 12:07

Scraper bots have a negative impact on various aspects of an organization, including revenue, competitive advantage, brand identity, customer...