X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 23/Aug 09:03

New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise

This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence and exfiltrating data through encrypted channels. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…

Articles similaires

Sorry! Image not available at this time

LummaC2 Infostealer Resurfaces with Obfuscated PowerShell Tactics

itsecuritynews.info - 30/Aug 10:02

The latest variant employs obfuscated PowerShell commands to download and execute malicious payloads, utilizing Windows binaries like Mshta.exe and...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads

itsecuritynews.info - 05/Sep 08:33

Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute Ratel and Havoc tools, as well as...

Sorry! Image not available at this time

Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads

itsecuritynews.info - 05/Sep 08:33

Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute Ratel and Havoc tools, as well as...

Sorry! Image not available at this time

OpenStack Ironic Users Urged to Patch Critical Vulnerability

itsecuritynews.info - 06/Sep 14:33

The flaw, discovered by security researchers at Red Hat and G-Research, could lead to unauthorized access to sensitive data through mishandled images...

Sorry! Image not available at this time

CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention

itsecuritynews.info - 05/Sep 12:32

Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially leading to unauthorized...

Sorry! Image not available at this time

CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention

itsecuritynews.info - 05/Sep 12:32

Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially leading to unauthorized...