X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 28/Aug 14:33

BlackByte Blends Known Tactics With New Encryptor Variant and Vulnerability Exploits to Support Ongoing Attacks

The latest encryptor variant identified by researchers at Cisco Talos appends the file extension ‘blackbytent_h’ to encrypted files. This variant also includes the deployment of four vulnerable drivers, an increase from previous reports. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw

itsecuritynews.info - 05/Sep 12:32

A new ransomware variant named Underground, linked to the Russia-based RomCom group, encrypts files on victims’ Windows machines and demands a...

Sorry! Image not available at this time

RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw

itsecuritynews.info - 05/Sep 12:32

A new ransomware variant named Underground, linked to the Russia-based RomCom group, encrypts files on victims’ Windows machines and demands a...

Sorry! Image not available at this time

Red Teaming Tool Abused for Malware Deployment

itsecuritynews.info - 04/Sep 13:02

Cisco Talos has assessed that red teaming tool MacroPack is being abused by various threat actors in different geographies to deploy malware This...

Sorry! Image not available at this time

Zero-Click Calendar Invite: Critical macOS Vulnerability Chain Uncovered

itsecuritynews.info - 14:32

The vulnerability, tracked as CVE-2022-46723, enables attackers to manipulate files within the macOS Calendar app environment and execute remote code...

Sorry! Image not available at this time

Fog Ransomware Now Targeting the Financial Sector

itsecuritynews.info - 07/Sep 07:32

Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network defenses. After infiltration, Fog...

Sorry! Image not available at this time

Fog Ransomware Now Targeting the Financial Sector

itsecuritynews.info - 07/Sep 07:32

Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network defenses. After infiltration, Fog...

Sorry! Image not available at this time

OpenStack Ironic Users Urged to Patch Critical Vulnerability

itsecuritynews.info - 06/Sep 14:33

The flaw, discovered by security researchers at Red Hat and G-Research, could lead to unauthorized access to sensitive data through mishandled images...

Sorry! Image not available at this time

Vulnerability in Acrobat Reader could lead to remote code execution; Microsoft patches information disclosure issue in Windows API

itsecuritynews.info - 11/Sep 16:32

CVE-2024-38257 is considered “less likely” to be exploited, though it does not require any user interaction or user privileges. This article has...

Sorry! Image not available at this time

Vulnerability in Acrobat Reader could lead to remote code execution; Microsoft patches information disclosure issue in Windows API

itsecuritynews.info - 11/Sep 16:32

CVE-2024-38257 is considered “less likely” to be exploited, though it does not require any user interaction or user privileges. This article has...

Sorry! Image not available at this time

CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention

itsecuritynews.info - 05/Sep 12:32

Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially leading to unauthorized...