X

Vous n'êtes pas connecté

Headings :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 04/11/2024 13:15

The Evolution of Transparent Tribe’s New Malware

Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…

Articles similaires

Sorry! Image not available at this time

Iran-linked actors use Telegram as C2 in malware attacks on dissidents

securityaffairs.co - 09:35

Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that...

Sorry! Image not available at this time

Grid vibrations: AI detects power supply cyberattacks in less than two seconds

techxplore.com - 16/Mar 20:20

Modern energy infrastructure is increasingly defined as cyber-physical systems where physical power distribution and digital communication are closely...

Sorry! Image not available at this time

Grid vibrations: AI detects power supply cyberattacks in less than two seconds

techxplore.com - 16/Mar 20:20

Modern energy infrastructure is increasingly defined as cyber-physical systems where physical power distribution and digital communication are closely...

Sorry! Image not available at this time

Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure

securityaffairs.co - 19/Mar 09:22

The Interlock ransomware group has exploited a Cisco FMC zero-day RCE vulnerability in attacks since late January. The Interlock ransomware group has...

Sorry! Image not available at this time

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

itsecuritynews.info - 16/Mar 19:34

The evolution of Iranian cyber operations in broad context: from custom wiper malware to misuse of legitimate admin tools and more. The post Iranian...

Sorry! Image not available at this time

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

itsecuritynews.info - 16/Mar 19:34

The evolution of Iranian cyber operations in broad context: from custom wiper malware to misuse of legitimate admin tools and more. The post Iranian...

UAE News: Authorities warn of ‘one of the most destructive’ cyber threats as Wiper malware risk rises

times of india - 14/Mar 05:43

The UAE Cyber Security Council has issued a critical alert regarding the escalating threat of wiper malware, a destructive software designed to...

UAE News: Authorities warn of ‘one of the most destructive’ cyber threats as Wiper malware risk rises

times of india - 14/Mar 05:43

The UAE Cyber Security Council has issued a critical alert regarding the escalating threat of wiper malware, a destructive software designed to...

Sorry! Image not available at this time

AI-powered defense system stops 5G cyber-attacks in a fraction of a second

techxplore.com - 10/Mar 15:20

An AI defense system has successfully detected and neutralized sophisticated 5G cyber-attacks in less than a tenth of a second, paving the way for...

Sorry! Image not available at this time

Solar cyber threats expand, but inverters still stay in the crosshairs

wn.com - 10:52

In an interview with pv magazine, Jay Johnson, the CTO of US-based cybersecurity firm DERSec, explains the PV systems face cybersecurity risks that...