X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 30/Aug 12:02

Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users

Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed “Voldemort” by the researchers, this campaign targets Windows users globally, employing a novel attack chain that combines both common and…

Articles similaires

Sorry! Image not available at this time

Scores of Organizations Hit By Novel Voldemort Malware

itsecuritynews.info - 02/Sep 08:32

Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from...

Sorry! Image not available at this time

Scores of Organizations Hit By Novel Voldemort Malware

itsecuritynews.info - 02/Sep 08:32

Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from...

Sorry! Image not available at this time

North Korean Hackers Targets Job Seekers with Fake FreeConference App

itsecuritynews.info - 04/Sep 16:32

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems...

Sorry! Image not available at this time

North Korean Hackers Targets Job Seekers with Fake FreeConference App

itsecuritynews.info - 04/Sep 16:32

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems...

Sorry! Image not available at this time

Cyberattack Targets Malaysian Officials with Babylon RAT Malware

itsecuritynews.info - 08/Sep 16:32

An investigation by the Cyble Research and Intelligence Lab (CRIL) has uncovered a sophisticated cyberattack aimed at Malaysian political figures and...

Sorry! Image not available at this time

Fileless Remcos RAT Campaign Leverages CVE-2017-0199 Flaw

itsecuritynews.info - 14/Sep 09:02

In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the Remcos Remote Access Trojan (RAT),...

Sorry! Image not available at this time

Fileless Remcos RAT Campaign Leverages CVE-2017-0199 Flaw

itsecuritynews.info - 14/Sep 09:02

In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the Remcos Remote Access Trojan (RAT),...

Sorry! Image not available at this time

Vo1d malware infected 1.3 Million Android-based TV Boxes in 197 countries

itsecuritynews.info - 13/Sep 10:33

Researchers uncovered an Android malware, dubbed Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web...

Sorry! Image not available at this time

Vo1d malware infected 1.3 Million Android-based TV Boxes in 197 countries

itsecuritynews.info - 13/Sep 10:33

Researchers uncovered an Android malware, dubbed Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web...

Sorry! Image not available at this time

Revival hijack attack affects PyPI

thecyberthrone.in - 05/Sep 02:04

Researchers from JFrog have discovered a new supply chain attack technique for attacking PyPI repositories, potentially impacting over 22,000 software...