X

Vous n'êtes pas connecté

Headings :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 04/11/2024 13:15

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Articles similaires

Sorry! Image not available at this time

AI making cyber attacks costlier and more effective: Munich Re

techxplore.com - 25/Mar 14:40

Artificial intelligence is making cyberattacks increasingly sophisticated and costlier for businesses, reinsurer Munich Re said Wednesday, warning of...

Sorry! Image not available at this time

Iran-linked actors use Telegram as C2 in malware attacks on dissidents

securityaffairs.co - 23/Mar 09:35

Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that...

Sorry! Image not available at this time

Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution

itsecuritynews.info - 01/Apr 11:34

Vim is a widely used, highly configurable text editor, but a recently disclosed flaw highlights the risks associated with its file-parsing features....

Sorry! Image not available at this time

Vim Modeline Vulnerability Opens Door to Arbitrary OS Command Execution

itsecuritynews.info - 01/Apr 11:34

Vim is a widely used, highly configurable text editor, but a recently disclosed flaw highlights the risks associated with its file-parsing features....

Sorry! Image not available at this time

China-Linked groups target Southeast Asian government with advanced malware in 2025

securityaffairs.co - 30/Mar 18:05

China-linked groups hit a Southeast Asian government in 2025, deploying multiple malware families in a sophisticated cyber campaign. In 2025, three...

Sorry! Image not available at this time

Cyber Briefing: 2026.03.25

itsecuritynews.info - 25/Mar 14:32

Resume phishing spreads malware, npm supply chain attacks steal crypto, TeamPCP backdoors packages, major breaches emerge, and regulators tighten...

Sorry! Image not available at this time

Solar cyber threats expand, but inverters still stay in the crosshairs

wn.com - 24/Mar 10:52

In an interview with pv magazine, Jay Johnson, the CTO of US-based cybersecurity firm DERSec, explains the PV systems face cybersecurity risks that...

Sorry! Image not available at this time

Obfuscated VBS and PNG Loaders Power New Open Directory Malware Campaign with RAT Payloads

itsecuritynews.info - 25/Mar 13:07

A sophisticated, multi-stage delivery framework leveraging obfuscated Visual Basic Script (VBS) files, fileless PowerShell loaders, and payloads...

Sorry! Image not available at this time

China-Backed Hackers Target Southeast Asian Military Systems in Ongoing Spy Campaign

itsecuritynews.info - 25/Mar 14:09

China-linked threat actors have been identified targeting Southeast Asian military networks in a long-running cyber espionage campaign focused on...

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....