Cisco Talos investigated the Qilin ransomware group, uncovering its frequent attacks on the manufacturing sector, use of legitimate tools for...
Vous n'êtes pas connecté
 Maroc -  ITSECURITYNEWS.INFO - A La Une - 04/11/2024 13:15
 Maroc -  ITSECURITYNEWS.INFO - A La Une - 04/11/2024 13:15
								Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…
Cisco Talos investigated the Qilin ransomware group, uncovering its frequent attacks on the manufacturing sector, use of legitimate tools for...
Cisco Talos investigated the Qilin ransomware group, uncovering its frequent attacks on the manufacturing sector, use of legitimate tools for...
A sophisticated cyberespionage campaign dubbed PassiveNeuron has emerged from the shadows after months of dormancy, with security researchers...
A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a...
A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control...
A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade...
A sophisticated, Rust-based malware dubbed ChaosBot has been exposed utilizing the Discord platform for its Command and Control (C2) operations. This...
3 posts were published in the last hour 6:34 : New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord 6:34 : Russia-linked COLDRIVER...
The notorious SideWinder advanced persistent threat (APT) group has evolved its cyber espionage tactics with a sophisticated new attack method,...
(MENAFN - Khaleej Times) As generative and Agentic AI technologies rapidly advance, so too do the cyber threats they enable. Malicious actors are...