X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 06/Jul 07:09

New Eldorado Ransomware Targets Windows, VMware ESXi VMs

Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types to prevent system damage. Affiliates can customize attacks on Windows, while Linux customization is limited. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

The Changing Dynamics of Ransomware as Law Enforcement Strikes

itsecuritynews.info - 11:32

Despite law enforcement actions disrupting major ransomware operations, the long-term impact remains uncertain as groups adapt and evolve....

Sorry! Image not available at this time

Nuclei: Open-Source Vulnerability Scanner

itsecuritynews.info - 13:33

Nuclei is an open-source vulnerability scanner known for its speed and customizable YAML-based templates. It offers flexibility in security checks by...

Sorry! Image not available at this time

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

itsecuritynews.info - 23/Aug 07:32

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links...

Sorry! Image not available at this time

PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

itsecuritynews.info - 23/Aug 15:32

Cryptojacking attackers are targeting poorly secured PostgreSQL databases on Linux systems. According to Aqua Security researchers, the attack begins...

Sorry! Image not available at this time

Two Remote Code Execution Vulnerabilities Discovered in Traccar GPS Tracking System

itsecuritynews.info - 26/Aug 12:31

The two vulnerabilities are path traversal flaws, with CVE-2024-24809 allowing unrestricted file upload with dangerous types and CVE-2024-31214...

Sorry! Image not available at this time

C-Suite Involvement in Cybersecurity is Little More Than Lip Service

itsecuritynews.info - 26/Aug 09:31

The C-suite’s lack of engagement in cybersecurity poses a significant risk despite the growing threat landscape. Organizations need to prioritize...

Sorry! Image not available at this time

CISA Adds Dahua IP Camera, Linux Kernel, and Microsoft Exchange Server Bugs to its KEV Catalog

itsecuritynews.info - 24/Aug 10:06

The CISA has added new vulnerabilities to its Known Exploited Vulnerabilities catalog, including Dahua IP Camera authentication bypass flaws, a Linux...

Sorry! Image not available at this time

Stealthy ‘sedexp’ Linux Malware Evaded Detection for Two Years

itsecuritynews.info - 26/Aug 12:02

A sophisticated Linux malware called ‘sedexp’ has been flying under the radar since 2022, utilizing a unique persistence technique not yet...

Sorry! Image not available at this time

DeathGrip: Emergence of a new Ransomware-as-a-Service

itsecuritynews.info - 14/Aug 09:03

Promoted through Telegram and other underground forums, DeathGrip RaaS offers aspiring threat actors on the dark web sophisticated ransomware tools,...

Sorry! Image not available at this time

Qilin Ransomware Caught Stealing Credentials Stored in Google Chrome

itsecuritynews.info - 23/Aug 16:32

A recent Qilin ransomware attack targeted several endpoints, stealing VPN credentials and Chrome browser data. This attack, detected in July 2024,...