X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 09/Aug 13:33

Threat Actors Exploiting Windows Systems To Deploy Multiple Malwares

A sophisticated phishing campaign targeting Windows systems leverages multiple evasion techniques, including Python obfuscation, shellcode generation, and loading, to deploy a payload of malware.  This multi-stage attack, disguised as a customer service request, delivers malicious attachments that, once opened, install…

Articles similaires

Sorry! Image not available at this time

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

itsecuritynews.info - 13/Sep 09:32

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199. By exploiting...

Sorry! Image not available at this time

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

itsecuritynews.info - 13/Sep 09:32

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199. By exploiting...

Sorry! Image not available at this time

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

itsecuritynews.info - 06/Sep 14:33

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By...

Sorry! Image not available at this time

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

itsecuritynews.info - 11:32

Two campaigns targeting Selenium Grid’s default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 10

securityaffairs.co - 08/Sep 12:34

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. BlackSuit...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

FBI warns crypto firms of aggressive social engineering attacks

bleepingcomputer.com - 03/Sep 17:43

The FBI warns of North Korean hackers aggressively targeting cryptocurrency companies and their employees in sophisticated social engineering attacks,...

Sorry! Image not available at this time

FBI warns crypto firms of aggressive social engineering attacks

bleepingcomputer.com - 03/Sep 17:43

The FBI warns of North Korean hackers aggressively targeting cryptocurrency companies and their employees in sophisticated social engineering attacks,...

Sorry! Image not available at this time

EchoStrike: Generate Undetectable Reverse Shells, Perform Process Injection

itsecuritynews.info - 16:32

EchoStrike features an interactive Python wizard for easy customization, various persistence techniques, binary padding for evasion, AES payload...