X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 30/Aug 09:32

Silent Intrusions: Godzilla Fileless Backdoors Targeting Atlassian Confluence

Trend Micro discovered that old Atlassian Confluence versions that were affected by CVE-2023-22527 are being exploited using a new in-memory fileless backdoor. This article has been indexed from Trend Micro Research, News and Perspectives Read the original article: Silent Intrusions:…

Articles similaires

Sorry! Image not available at this time

AI-Powered BEC Scams Zero in on Manufacturers

itsecuritynews.info - 28/Oct 09:34

Vipre research reveals that 10% of emails targeting the manufacturing sector are BEC attempts This article has been indexed from...

Sorry! Image not available at this time

Fake CAPTCHA Pages Used by Lumma Stealer to Spread Fileless Malware

itsecuritynews.info - 22/Oct 18:34

Lumma Stealer malware uses fake CAPTCHA to deceive victims. This information-stealing malware targets sensitive data like passwords and… This...

Sorry! Image not available at this time

Columbus Ransomware Attack Exposes Data of 500,000 Residents

itsecuritynews.info - 17:38

The City of Columbus, Ohio, informed the Maine Attorney General’s Office that approximately 55% of its residents were affected by the breach This...

Sorry! Image not available at this time

Joint Statement by FBI and CISA on PRC Activity Targeting Telecommunications

itsecuritynews.info - 25/Oct 19:36

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from CISA News Read...

Sorry! Image not available at this time

Grandoreiro, the global trojan with grandiose ambitions

itsecuritynews.info - 22/Oct 18:34

In this report, Kaspersky experts analyze recent Grandoreiro campaigns, new targets, tricks, and banking trojan versions. This article has been...

Sorry! Image not available at this time

LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks

itsecuritynews.info - 22/Oct 16:32

Cloud attacks surged in 2024 as attackers exploited cloud resources at unprecedented levels This article has been indexed from...

Sorry! Image not available at this time

Google Researchers Claim First Vulnerability Found Using AI

itsecuritynews.info - 15:33

The flaw, an exploitable stack buffer underflow in SQLite, was found by Google’s Big Sleep team using a large language model (LLM) This article has...

Sorry! Image not available at this time

Spring Security fixes Critical Vulnerability CVE-2024-38821

thecyberthrone.in - 29/Oct 08:30

Spring Security has disclosed a critical vulnerability impacting WebFlux applications, enables an authorization bypass under specific conditions. If...

Sorry! Image not available at this time

Apache Lucene fixes CVE-2024-43383

thecyberthrone.in - 02/Nov 04:02

Apache Lucene.NET, an open-source search library has been discovered having a security flaw that could allow attackers to remotely execute malicious...

Sorry! Image not available at this time

Fortinet Confirms Zero-Day Exploit Targeting FortiManager Systems

itsecuritynews.info - 23/Oct 20:04

Fortinet confirms zero-day exploits hitting remote code execution bug in the FortiManager platform. CVSS severity score 9.8/10. The post Fortinet...