X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 23/Aug 11:32

Leveraging Ancient Tactics for Modern Malware

The HYAS Threat Intelligence team has detected threat actors using Steam for malicious activities, like hosting C2 domain addresses and exploiting user accounts. One actor used a Substitution Cipher to hide C2 domains. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

itsecuritynews.info - 23/Oct 16:37

It only takes five days on average for attackers to exploit a vulnerability, according to a new report. This article has been indexed from Security |...

Sorry! Image not available at this time

Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks

itsecuritynews.info - 29/Oct 13:36

Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall...

Sorry! Image not available at this time

Microsoft Sharepoint Server CVE-2024-38094 Exploited

thecyberthrone.in - 01/Nov 14:15

Threat actors have exploited a vulnerability in Microsoft SharePoint Server, identified as CVE-2024-38094, allowing them to gain complete domain...

Sorry! Image not available at this time

Microsoft Sharepoint Server CVE-2024-38094 Exploited

thecyberthrone.in - 01/Nov 14:15

Threat actors have exploited a vulnerability in Microsoft SharePoint Server, identified as CVE-2024-38094, allowing them to gain complete domain...

Sorry! Image not available at this time

Updated FakeCall Malware Targets Mobile Devices with Vishing

itsecuritynews.info - 30/Oct 16:34

The new FakeCall variant uses advanced vishing tactics, featuring Bluetooth for device monitoring This article has been indexed from...

Sorry! Image not available at this time

Updated FakeCall Malware Targets Mobile Devices with Vishing

itsecuritynews.info - 30/Oct 16:34

The new FakeCall variant uses advanced vishing tactics, featuring Bluetooth for device monitoring This article has been indexed from...

Sorry! Image not available at this time

SonicWall Vulnerability exploited by Fog and Akira Ransomware

thecyberthrone.in - 30/Oct 02:24

Sonicwall SSL VPN vulnerability tracked as CVE-2024-40766 has been exploited in the recent cyberattacks involving Akira and Fog ransomware. Initial...

Sorry! Image not available at this time

Chenlun’s Evolving Phishing Tactics Target Trusted Brands

itsecuritynews.info - 29/Oct 16:36

The phishing campaign targeted users via texts impersonating Amazon, linked to the threat actor Chenlun This article has been indexed from...

Sorry! Image not available at this time

Custom "Pygmy Goat" malware used in Sophos Firewall hack on govt network

bleepingcomputer.com - 04/Nov 17:46

UK's National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named "Pigmy Goat" created to backdoor Sophos XG firewall...

Sorry! Image not available at this time

Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer

itsecuritynews.info - 30/Oct 21:32

A malvertising campaign is exploiting Meta’s platform to spread SYS01 infostealer, targeting men 45+ via fake ads for… This article has been...