X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 12/Aug 07:32

Emerging Exfiltration Tools Highlight Growing Threats to Enterprise Data

Cybercriminals have significantly increased their use of data-exfiltration tools, which are highly effective for stealing sensitive data and evading detection. This was revealed in a recent report by ReliaQuest, which highlights the evolving strategies of threat actors in the digital…

Articles similaires

Sorry! Image not available at this time

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

itsecuritynews.info - 10/Sep 10:02

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the...

Sorry! Image not available at this time

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

itsecuritynews.info - 10/Sep 10:02

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the...

Sorry! Image not available at this time

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

bleepingcomputer.com - 05/Sep 09:15

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma...

Sorry! Image not available at this time

Phishing Remains Top Cyber Threat Despite Drop in Incidents

itsecuritynews.info - 05/Sep 06:32

Phishing remains the most common cyber threat, representing 37% of incidents in Q3 2024. However, incidents of credential exposure have increased to...

Sorry! Image not available at this time

Phishing Remains Top Cyber Threat Despite Drop in Incidents

itsecuritynews.info - 05/Sep 06:32

Phishing remains the most common cyber threat, representing 37% of incidents in Q3 2024. However, incidents of credential exposure have increased to...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

Threat Actors Allegedly Claiming Leak of Capgemini Data

itsecuritynews.info - 10/Sep 07:32

Threat actors have allegedly leaked sensitive data from Capgemini, a global leader in consulting, technology services, and digital transformation. The...

Sorry! Image not available at this time

Going on a Threat Hunt: Advanced Strategies for Defending the Digital Frontier

itsecuritynews.info - 02/Sep 14:33

Editor’s Note: The following is an article written for and published in DZone’s 2024 Trend Report, Enterprise Security: Reinforcing Enterprise...

Sorry! Image not available at this time

From Threats to Trends: Highlights from Perception Point’s H1 2024 Report

itsecuritynews.info - 04/Sep 13:02

Cybersecurity is a constant cat-and-mouse game, with threat actors always refining their tactics to create more sophisticated and complex attacks,...