X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 28/Jun 16:32

New Unfurling Hemlock Threat Actor Floods Systems with Malware

Unfurling Hemlock is using a new method, referred to as a “malware cluster bomb,” which allows the threat actor to use one malware sample to spread additional malware on compromised machines. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Clever ‘GitHub Scanner’ Campaign Abusing Repositories to Push Malware

itsecuritynews.info - 21/Sep 07:33

A sophisticated campaign is using GitHub repositories to spread the Lumma Stealer malware, targeting users interested in open-source projects or...

Sorry! Image not available at this time

Hackers Deliver Popular Crypto-Miner Through Malicious Email Auto Replies, Researchers Say

itsecuritynews.info - 20/Sep 14:32

Hackers are distributing a popular crypto-miner via malicious email auto-replies, as per researchers. They compromised email accounts to send innocent...

Sorry! Image not available at this time

China-linked APT group Salt Typhoon compromised some US ISPs

itsecuritynews.info - 28/Sep 06:34

Experts are investigating whether the hackers gained access to Cisco Systems routers, a key component of ISP infrastructures, but Cisco has not found...

Sorry! Image not available at this time

Cybercriminals Exploit CAPTCHA to Deliver Malware: Experts Issue Warning

itsecuritynews.info - 20/Sep 10:32

These counterfeit CAPTCHA tests prompt users to execute seemingly harmless commands, which actually lead to the installation of the dangerous Lumma...

Sorry! Image not available at this time

Update: PoC Exploit Released for Windows Hyper-V Zero-Day Vulnerability

itsecuritynews.info - 17/Sep 16:32

This critical flaw, actively exploited in the wild, allows attackers to elevate privileges to SYSTEM level, posing a significant risk to organizations...

Sorry! Image not available at this time

Update: PKfail Secure Boot Bypass Remains a Significant Risk Two Months Later

itsecuritynews.info - 19/Sep 10:32

Approximately nine percent of tested firmware images use non-production cryptographic keys that are publicly known, making Secure Boot devices...

Sorry! Image not available at this time

Experts Warn of China-Linked APT’s Raptor Train IoT Botnet

itsecuritynews.info - 20/Sep 11:02

The attribution of the Raptor Train botnet to a Chinese nation-state actor is based on various factors, including operational timelines, targeting...

Sorry! Image not available at this time

HPE Patches Three Critical Security Holes in Aruba PAPI

itsecuritynews.info - 28/Sep 07:34

HPE has released patches for three critical security vulnerabilities in Aruba’s networking access points, which could allow attackers to run code on...

Sorry! Image not available at this time

New RomCom malware variant 'SnipBot' spotted in data theft attacks

bleepingcomputer.com - 26/Sep 21:26

A new variant of the RomCom malware called SnipBot, has been used in attacks that pivot on the network to steal data from compromised systems. [...]

Sorry! Image not available at this time

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

itsecuritynews.info - 17:02

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence...