X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 01/11/2024 09:40

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices. The malware’s core binaries were even signed with the same certificate used in jailbreak kits, indicating deep integration. The C2 servers, active until October 26,…

Articles similaires

Sorry! Image not available at this time

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

itsecuritynews.info - 24/Mar 11:12

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact...

Sorry! Image not available at this time

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

itsecuritynews.info - 02/Apr 19:34

Google patches 21 Chrome vulnerabilities, including an actively exploited zero-day flaw that could enable code execution and full device compromise....

Sorry! Image not available at this time

New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

itsecuritynews.info - 03/Apr 13:13

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities,...

Sorry! Image not available at this time

New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover

itsecuritynews.info - 03/Apr 13:13

Security researchers at watchTowr Labs have disclosed a critical exploit chain in the Progress ShareFile Storage Zone Controller. The vulnerabilities,...

Sorry! Image not available at this time

Russia-linked APT TA446 uses DarkSword exploit to target iPhone users in phishing wave

securityaffairs.co - 30/Mar 07:34

Russia-linked TA446 is using the DarkSword iOS exploit kit in targeted phishing campaigns to compromise iPhone users. Russia-linked APT group TA446...

Sorry! Image not available at this time

CISA adds Langflow and Trivy bugs to KEV Catalog

thecyberthrone.in - 27/Mar 12:07

Langflow Code Injection Flaw Actively Exploited — CVE-2026-33017 CISA has added a critical code injection vulnerability in Langflow to its Known...

Sorry! Image not available at this time

When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com – Part Five

itsecuritynews.info - 25/Mar 14:09

Dear blog readers,  Continuing the “When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on...

Sorry! Image not available at this time

Solar cyber threats expand, but inverters still stay in the crosshairs

wn.com - 24/Mar 10:52

In an interview with pv magazine, Jay Johnson, the CTO of US-based cybersecurity firm DERSec, explains the PV systems face cybersecurity risks that...

Sorry! Image not available at this time

Phishing LNK files and GitHub C2 power new DPRK cyber attacks

securityaffairs.co - 19:34

DPRK-linked hackers use GitHub C2s, starting attacks via phishing LNK files that drop a PDF and PowerShell script in South Korea. North Korea-linked...

Sorry! Image not available at this time

Iran-linked actors use Telegram as C2 in malware attacks on dissidents

securityaffairs.co - 23/Mar 09:35

Iran-linked actors use Telegram as C2 to spread malware targeting dissidents and journalists, enabling surveillance and data theft. The FBI warns that...