X

Vous n'êtes pas connecté

Rubriques :

  - ITSECURITYNEWS.INFO - A La Une - 13/09/2024 13:02

Chinese-speaking Hackers Linked to DragonRank SEO Manipulator Service

By exploiting web app services, the attackers deploy a web shell to launch malware and gather credentials, compromising IIS servers to spread the BadIIS malware. The malware facilitates proxy ware and SEO fraud by manipulating search engine rankings. This article…

Articles similaires

Sorry! Image not available at this time

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools

itsecuritynews.info - 19:32

Cybercriminals have intensified their assault on poorly managed Linux SSH servers, deploying sophisticated proxy tools to establish covert network...

Sorry! Image not available at this time

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools

itsecuritynews.info - 19:32

Cybercriminals have intensified their assault on poorly managed Linux SSH servers, deploying sophisticated proxy tools to establish covert network...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild

itsecuritynews.info - 25/Jun 20:36

Researchers have uncovered a new malware sample in the wild that employs a unique and unconventional evasion tactic: prompt injection aimed at...

Sorry! Image not available at this time

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild

itsecuritynews.info - 25/Jun 20:36

Researchers have uncovered a new malware sample in the wild that employs a unique and unconventional evasion tactic: prompt injection aimed at...

Sorry! Image not available at this time

Hackers deploy fake SonicWall VPN App to steal corporate credentials

securityaffairs.co - 25/Jun 18:09

Hackers spread a trojanized version of SonicWall VPN app to steal login credentials from users accessing corporate networks. Unknown threat actors are...

Sorry! Image not available at this time

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames

itsecuritynews.info - 26/Jun 11:03

IBM X-Force researchers have uncovered a series of targeted cyberattacks orchestrated by the China-aligned threat actor Hive0154. Throughout 2025,...

Sorry! Image not available at this time

Hackers turn ScreenConnect into malware using Authenticode stuffing

bleepingcomputer.com - 25/Jun 21:51

Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the...

Sorry! Image not available at this time

Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing

itsecuritynews.info - 25/Jun 12:33

A critical vulnerability in Realtek’s Bluetooth Low Energy (BLE) implementation enables attackers to launch denial-of-service (DoS) attacks during...