X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 01/11/2024 09:40

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices. The malware’s core binaries were even signed with the same certificate used in jailbreak kits, indicating deep integration. The C2 servers, active until October 26,…

Articles similaires

Sorry! Image not available at this time

Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks

itsecuritynews.info - 18/Feb 20:34

Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) have emerged as a major threat to enterprise networks, with active...

Sorry! Image not available at this time

Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks

itsecuritynews.info - 18/Feb 20:34

Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) have emerged as a major threat to enterprise networks, with active...

Sorry! Image not available at this time

Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices

itsecuritynews.info - 21/Feb 16:34

A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55...

Sorry! Image not available at this time

Hackers Leveraging Multiple AI Services to Compromise 600+ FortiGate Devices

itsecuritynews.info - 21/Feb 16:34

A financially motivated threat actor exploited various commercial generative AI services to compromise over 600 FortiGate devices across more than 55...

Sorry! Image not available at this time

CISA Warns of Multiple Roundcube Vulnerabilities Exploited in Attacks

itsecuritynews.info - 23/Feb 12:03

CISA has officially updated its Known Exploited Vulnerabilities (KEV) Catalog to include new security flaws affecting a popular webmail platform. On...

Sorry! Image not available at this time

CISA Warns of Multiple Roundcube Vulnerabilities Exploited in Attacks

itsecuritynews.info - 23/Feb 12:03

CISA has officially updated its Known Exploited Vulnerabilities (KEV) Catalog to include new security flaws affecting a popular webmail platform. On...

Sorry! Image not available at this time

OysterLoader Evolves With New C2 Infrastructure and Obfuscation

itsecuritynews.info - 16/Feb 16:32

OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages This article has been indexed from...

Sorry! Image not available at this time

OysterLoader Evolves With New C2 Infrastructure and Obfuscation

itsecuritynews.info - 16/Feb 16:32

OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages This article has been indexed from...

Sorry! Image not available at this time

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

itsecuritynews.info - 18/Feb 07:36

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV)...

Sorry! Image not available at this time

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

itsecuritynews.info - 18/Feb 07:36

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV)...