X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 28/Aug 18:32

Iran’s Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle Iranian government-backed cybercriminals have been hacking into US and foreign networks as recently as this month to steal sensitive data and deploy ransomware, and they’re breaking in via vulnerable VPN…

Articles similaires

Sorry! Image not available at this time

Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises

itsecuritynews.info - 02/Sep 10:32

A fake Palo Alto GlobalProtect VPN access tool is being used as bait by threat actors targeting Middle Eastern organizations. The malware, disguised...

Sorry! Image not available at this time

Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises

itsecuritynews.info - 02/Sep 10:32

A fake Palo Alto GlobalProtect VPN access tool is being used as bait by threat actors targeting Middle Eastern organizations. The malware, disguised...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Threat Actors Install Backdoor via Fake Palo Alto GlobalProtect Lure

itsecuritynews.info - 03/Sep 16:32

  Malware disguising itself as the authentic Palo Alto GlobalProtect Tool is employed by malicious actors to target Middle Eastern firms. This...

Sorry! Image not available at this time

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

itsecuritynews.info - 10/Sep 10:03

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to...

Sorry! Image not available at this time

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

itsecuritynews.info - 10/Sep 10:03

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to...

Sorry! Image not available at this time

Adlumin Thwarts Fog Ransomware Attack Using Innovative Decoy Technology

itsecuritynews.info - 10/Sep 16:32

  In early August 2024, cybercriminals launched a ransomware attack on a mid-sized financial firm using compromised VPN credentials, deploying the...

Sorry! Image not available at this time

Adlumin Thwarts Fog Ransomware Attack Using Innovative Decoy Technology

itsecuritynews.info - 10/Sep 16:32

  In early August 2024, cybercriminals launched a ransomware attack on a mid-sized financial firm using compromised VPN credentials, deploying the...

Sorry! Image not available at this time

Researchers Details Attacks On Air-Gaps Computers To Steal Data

itsecuritynews.info - 10/Sep 10:32

The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which is commonly...

Sorry! Image not available at this time

Researchers Details Attacks On Air-Gaps Computers To Steal Data

itsecuritynews.info - 10/Sep 10:32

The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which is commonly...