X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 15/08/2024 11:32

Identity Threat Detection and Response Solution Guide

The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response (ITDR) has emerged as a critical component to effectively detect and respond to identity-based attacks. Threat actors have shown their ability to compromise the identity infrastructure and…

Articles similaires

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Make Identity Threat Detection your security strategy for 2026

bleepingcomputer.com - 20/Jan 15:01

Identity-based attacks are one of the primary paths attackers use to breach corporate networks. Tenfold shows how Identity Threat Detection helps spot...

Sorry! Image not available at this time

Make Identity Threat Detection your security strategy for 2026

bleepingcomputer.com - 20/Jan 15:01

Identity-based attacks are one of the primary paths attackers use to breach corporate networks. Tenfold shows how Identity Threat Detection helps spot...

Sorry! Image not available at this time

Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure

itsecuritynews.info - 14/Jan 22:02

A sophisticated malware loader known as CastleLoader has emerged as a critical threat to US government agencies and critical infrastructure...

Sorry! Image not available at this time

UAT-8837 Launches Targeted Attacks to Steal Sensitive Organizational Data

itsecuritynews.info - 16/Jan 15:05

UAT-8837, a China-nexus advanced persistent threat (APT) actor, is conducting sustained campaigns against critical infrastructure sectors across North...

Sorry! Image not available at this time

UAT-8837 Launches Targeted Attacks to Steal Sensitive Organizational Data

itsecuritynews.info - 16/Jan 15:05

UAT-8837, a China-nexus advanced persistent threat (APT) actor, is conducting sustained campaigns against critical infrastructure sectors across North...

Sorry! Image not available at this time

Researchers Gain Access to StealC Malware Command-and-Control Systems

itsecuritynews.info - 17/Jan 07:31

Security researchers successfully exploited vulnerabilities in the StealC malware infrastructure, gaining access to operator control panels and...

Sorry! Image not available at this time

Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

itsecuritynews.info - 19/Jan 14:36

A newly analyzed campaign dubbed “Evelyn Stealer” is turning the Visual Studio Code (VSC) extension ecosystem into an attack delivery platform,...

Sorry! Image not available at this time

Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

itsecuritynews.info - 19/Jan 14:36

A newly analyzed campaign dubbed “Evelyn Stealer” is turning the Visual Studio Code (VSC) extension ecosystem into an attack delivery platform,...