X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 04/Nov 13:15

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Articles similaires

Exploring Cyber-Darkness: How Moscow Undermines The West Via The Dark Web – Analysis

eurasiareview.com - 15/Dec 00:19

By Manucharian Grigoriy Russian hybrid warfare is an intricate field where elements of cyber and physical operations intertwine seamlessly....

Sorry! Image not available at this time

Most Prevailed Malware families in 2024 Analysis

thecyberthrone.in - 05:37

Reflecting on the malware landscape of 2024, it’s clear that cyber threats have continued to evolve and become more sophisticated. Here are some...

Sorry! Image not available at this time

Russia targets Ukraine sensitive data servers with Cyber Attacks

itsecuritynews.info - 20/Dec 15:33

Russia appears to be tightening its grip on Ukraine through multiple means, simultaneously escalating military attacks and launching sophisticated...

Sorry! Image not available at this time

Russia targets Ukraine sensitive data servers with Cyber Attacks

itsecuritynews.info - 20/Dec 15:33

Russia appears to be tightening its grip on Ukraine through multiple means, simultaneously escalating military attacks and launching sophisticated...

Sorry! Image not available at this time

Russia-linked APT29 group used red team tools in rogue RDP attacks

securityaffairs.co - 18/Dec 22:24

Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October...

Sorry! Image not available at this time

AI & Cybersecurity: KnowBe4 Predictions for 2025 Emerging Trends

itnewsafrica.com - 10/Dec 09:35

KnowBe4‘s 2025 cybersecurity predictions highlight the rapid evolution of cyber threats in 2024, largely due to the increasing popularity and number...

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

itsecuritynews.info - 15/Dec 16:34

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

itsecuritynews.info - 15/Dec 16:34

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...

Sorry! Image not available at this time

Microsoft Teams was leaveraged to spread DarkGate malware

thecyberthrone.in - 19/Dec 05:24

A sophisticated cyberattack using DarkGate malware was discovered being distributed through a vishing (voice phishing) technique via Microsoft Teams....

Sorry! Image not available at this time

Ledger Users Targeted by Sophisticated Phishing Attacks

itsecuritynews.info - 15:02

  < p style=”text-align: justify;”> Ledger users are once again in the crosshairs of phishing attacks as hackers employ increasingly advanced...