X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 01/11/2024 09:40

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices. The malware’s core binaries were even signed with the same certificate used in jailbreak kits, indicating deep integration. The C2 servers, active until October 26,…

Articles similaires

Sorry! Image not available at this time

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

itsecuritynews.info - 02/Apr 19:34

Google patches 21 Chrome vulnerabilities, including an actively exploited zero-day flaw that could enable code execution and full device compromise....

Sorry! Image not available at this time

New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

itsecuritynews.info - 03/Apr 13:13

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities,...

Sorry! Image not available at this time

New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

itsecuritynews.info - 03/Apr 13:13

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities,...

Sorry! Image not available at this time

IT Security News Hourly Summary 2026-04-08 12h : 14 posts

itsecuritynews.info - 08/Apr 10:05

14 posts were published in the last hour 9:38 : New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto 9:38 : GreyNoise Launches C2...

Sorry! Image not available at this time

Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave

securityaffairs.co - 30/Mar 07:34

Russia-linked TA446 is using the DarkSword iOS exploit kit in targeted phishing campaigns to compromise iPhone users. Russia-linked APT group TA446...

Sorry! Image not available at this time

Chaos malware expands from routers to Linux cloud servers

itsecuritynews.info - 08/Apr 10:07

Chaos, Go-based malware first documented by Lumen’s Black Lotus Labs, has historically targeted routers and edge devices. A new variant observed in...

Sorry! Image not available at this time

Phishing LNK files and GitHub C2 power new DPRK cyber attacks

securityaffairs.co - 06/Apr 19:34

DPRK-linked hackers use GitHub C2s, starting attacks via phishing LNK files that drop a PDF and PowerShell script in South Korea. North Korea-linked...

Sorry! Image not available at this time

New STX RAT Uses Hidden Remote Desktop and Infostealer Features to Evade Detection

itsecuritynews.info - 09/Apr 15:36

A newly discovered remote access trojan called STX RAT has emerged as a serious cybersecurity threat in 2026, combining hidden remote desktop access...

Sorry! Image not available at this time

New STX RAT Uses Hidden Remote Desktop and Infostealer Features to Evade Detection

itsecuritynews.info - 09/Apr 15:36

A newly discovered remote access trojan called STX RAT has emerged as a serious cybersecurity threat in 2026, combining hidden remote desktop access...

Sorry! Image not available at this time

CVE-2026-5281 — Google Chrome Dawn Use-After-Free Under Active Exploitation

thecyberthrone.in - 02/Apr 02:20

CISA has added CVE-2026-5281 to its Known Exploited Vulnerabilities catalog, marking the fourth Chrome zero-day exploited in the wild during 2026...