X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 02/Sep 09:02

OceanLotus APT Group Targeting Vietnamese Human Rights Defenders

The attackers use spear-phishing lures and watering hole campaigns to infiltrate networks and collect sensitive data. Huntress identified four compromised hosts in recent attacks, linking them to Cobalt Strike Beacons and encrypted DLL payloads. This article has been indexed from…

Articles similaires

Sorry! Image not available at this time

Russia-linked Midnight Blizzard APT targeted 100+ organizations with a spear-phishing campaign using RDP files

itsecuritynews.info - 30/Oct 20:08

Microsoft warns of a new phishing campaign by Russia-linked APT Midnight Blizzard targeting hundreds of organizations. Microsoft warns of a...

Sorry! Image not available at this time

Microsoft Warns: Midnight Blizzard’s Ongoing Spear-Phishing Campaign with RDP Files

itsecuritynews.info - 01/Nov 14:36

An ongoing spear-phishing campaign is affecting a variety of companies, including governmental agencies. According to Microsoft, the Russian APT group...

Sorry! Image not available at this time

Defenders Outpace Attackers in AI Adoption

itsecuritynews.info - 07/Nov 09:11

Trend Micro’s Robert McArdle says cybercriminals use of AI is far more limited than many realize, and pales in comparison to defenders’ use of the...

Sorry! Image not available at this time

Russia-linked Midnight Blizzard APT targeted 100+ organizations with a spear-phishing campaign using RDP files

securityaffairs.co - 30/Oct 19:20

Microsoft warns of a new phishing campaign by Russia-linked APT Midnight Blizzard targeting hundreds of organizations. Microsoft warns of a...

Sorry! Image not available at this time

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials

itsecuritynews.info - 28/Oct 11:36

Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to...

Sorry! Image not available at this time

EMERALDWHALE Steals 15,000+ Cloud Credentials, Stores Data in S3 Bucket

itsecuritynews.info - 01/Nov 16:06

EMERALDWHALE operation compromises over 15,000 cloud credentials, exploiting exposed Git and Laravel files. Attackers use compromised S3 buckets…...

Sorry! Image not available at this time

New Campaign Uses Remcos RAT to Exploit Victims

itsecuritynews.info - 14:07

See how threat actors have abused Remcos to collect sensitive information from victims and remotely control their computers to perform further...

Sorry! Image not available at this time

Russian Cozy Bear Hackers Phish Critical Sectors with Microsoft, AWS Lures

itsecuritynews.info - 30/Oct 18:36

Russian state-sponsored hackers Cozy Bear are targeting over 100 organizations globally with a new phishing campaign. This sophisticated… This...

Sorry! Image not available at this time

Chinese attackers accessed Canadian government networks – for five years

itsecuritynews.info - 31/Oct 06:11

India makes it onto list of likely threats for the first time A report by Canada’s Communications Security Establishment (CSE) revealed that...

Sorry! Image not available at this time

How LLMs could help defenders write better and faster detection

itsecuritynews.info - 25/Oct 14:34

Can LLM tools actually help defenders in the cybersecurity industry write more effective detection content? Read the full research This article has...