X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 28/Jun 09:04

Xeno RAT Spread via .gg Domains and GitHub

XenoRAT is being used by North Korean hackers and other actors targeting the gaming community. It is being spread through .gg domains and a GitHub repository disguised as Roblox scripting tools. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Rafel RAT Used in 120 Campaigns Targeting Android Device Users

itsecuritynews.info - 24/Jun 18:10

Multiple bad actors are using the Rafel RAT malware in about 120 campaigns aimed at compromising Android devices and launching a broad array of...

Sorry! Image not available at this time

Hackers attack HFS servers to drop malware and Monero miners

itsecuritynews.info - 04/Jul 13:32

Hackers are targeting older versions of the HTTP File Server from Rejetto to drop malware and cryptocurrency mining software by exploiting a critical...

Sorry! Image not available at this time

Secator: Open-Source Pentesting Swiss Army Knife

itsecuritynews.info - 03/Jul 15:05

Secator is an open-source task and workflow runner designed for security assessments to streamline the use of various security tools for pen testers...

Sorry! Image not available at this time

CoinStats says North Korean hackers breached 1,590 crypto wallets

bleepingcomputer.com - 24/Jun 14:56

CoinStats suffered a massive security breach that compromised 1,590 cryptocurrency wallets, with the attack suspected to have been carried out by...

Sorry! Image not available at this time

CapraRAT Spyware Variant Disguised as Popular Apps to Target Android Users

itsecuritynews.info - 02/Jul 13:09

The recent campaign shows updates to the group’s techniques and social engineering tactics, as well as efforts to maximize the spyware’s...

Sorry! Image not available at this time

Passkey Redaction Attacks Subvert GitHub, Microsoft Authentication

itsecuritynews.info - 06:32

Online accounts are increasingly protected by passkey technology, but many platforms like banking, e-commerce, social media, and software development...

Sorry! Image not available at this time

How Hacked YouTube Channels Spread Scams and Malware

itsecuritynews.info - 02/Jul 13:09

The most common attack methods against YouTube channels involve phishing attacks to steal login credentials, exploiting weak or reused passwords, and...

Sorry! Image not available at this time

New Unfurling Hemlock Threat Actor Floods Systems with Malware

itsecuritynews.info - 28/Jun 16:32

Unfurling Hemlock is using a new method, referred to as a “malware cluster bomb,” which allows the threat actor to use one malware sample to...

Sorry! Image not available at this time

Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure

itsecuritynews.info - 03/Jul 14:32

In the early part of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a significant threat utilizing the drive-by...

Sorry! Image not available at this time

Critical GitLab Bug Lets Attackers Run Pipelines as Any User

itsecuritynews.info - 29/Jun 06:06

A critical vulnerability has been discovered in certain versions of GitLab Community and Enterprise Edition products. This vulnerability allows an...