X

Vous n'êtes pas connecté

Headings :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 04/11/2024 13:15

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Articles similaires

Sorry! Image not available at this time

Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack

itsecuritynews.info - 06/Feb 13:36

A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on Indian government,...

Sorry! Image not available at this time

Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack

itsecuritynews.info - 06/Feb 13:36

A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on Indian government,...

Sorry! Image not available at this time

AFP cyber chief warns of rising threats linked to West PH Sea

inquirer.net - 19:15

MANILA, Philippines — The Philippine military’s cyber chief warned on Thursday of escalating cyber threats against the country, many linked to...

Sorry! Image not available at this time

Google Links CANFAIL Malware Attacks to Suspected Russia-Aligned Group

itsecuritynews.info - 15/Feb 22:18

  A newly identified cyber espionage group has been linked to a wave of digital attacks against Ukrainian institutions, according to findings...

Sorry! Image not available at this time

Google Links CANFAIL Malware Attacks to Suspected Russia-Aligned Group

itsecuritynews.info - 15/Feb 22:18

  A newly identified cyber espionage group has been linked to a wave of digital attacks against Ukrainian institutions, according to findings...

Sorry! Image not available at this time

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware

itsecuritynews.info - 09/Feb 12:23

The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure from...

Sorry! Image not available at this time

BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution

itsecuritynews.info - 07/Feb 11:18

BeyondTrust has disclosed a critical pre-authentication remote code execution vulnerability affecting its Remote Support (RS) and Privileged Remote...

Sorry! Image not available at this time

APT36 Targets Linux Systems With New Tools Designed to Disrupt Services

itsecuritynews.info - 10/Feb 12:36

Critical infrastructure worldwide faces mounting threats from sophisticated, state-sponsored “espionage ecosystems.” These well-funded...

Why Wargaming Matters In An Age Of Hybrid Conflict And Artificial Intelligence – Analysis

eurasiareview.com - 15/Feb 01:32

States define and pursue their national interests. Inevitably, these interests collide with those of competing states, generating economic,...

Why Wargaming Matters In An Age Of Hybrid Conflict And Artificial Intelligence – Analysis

eurasiareview.com - 15/Feb 01:32

States define and pursue their national interests. Inevitably, these interests collide with those of competing states, generating economic,...