X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 15/12/2024 16:34

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic Security Lab researchers discovered a new loadable kernel module (LKM) rootkit called PUMAKIT that supports advanced evasion mechanisms. PUMAKIT features a multi-stage…

Articles similaires

Sorry! Image not available at this time

New China Linked VoidLink Linux Malware Targets Major Cloud Providers

itsecuritynews.info - 14/Jan 19:06

Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this...

Sorry! Image not available at this time

VoidLink shows how one developer used AI to build a powerful Linux malware

securityaffairs.co - 21/Jan 08:25

VoidLink is a cloud-focused Linux malware, likely built by one person using AI, offering loaders, implants, rootkit evasion, and modular plugins....

Sorry! Image not available at this time

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions

itsecuritynews.info - 19/Jan 05:07

A sophisticated malware campaign has compromised users of Chrome, Firefox, and Edge by deploying 17 malicious extensions that employ advanced...

Sorry! Image not available at this time

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions

itsecuritynews.info - 19/Jan 05:07

A sophisticated malware campaign has compromised users of Chrome, Firefox, and Edge by deploying 17 malicious extensions that employ advanced...

Sorry! Image not available at this time

GootLoader uses malformed ZIP files to bypass security controls

itsecuritynews.info - 18/Jan 19:36

GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware actors for...

Sorry! Image not available at this time

GootLoader uses malformed ZIP files to bypass security controls

itsecuritynews.info - 18/Jan 19:36

GootLoader malware uses malformed ZIP files made of hundreds of concatenated archives to evade detection. GootLoader is used by ransomware actors for...

Sorry! Image not available at this time

New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

itsecuritynews.info - 10/Jan 07:32

Cybersecurity researchers have discovered a new variant of the MacSync malware targeting macOS users. Unlike previous versions that relied on complex...

Sorry! Image not available at this time

New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

itsecuritynews.info - 10/Jan 07:32

Cybersecurity researchers have discovered a new variant of the MacSync malware targeting macOS users. Unlike previous versions that relied on complex...

Honor Watch GS 5 Launched With Thin Body And 23-Day Battery

thecekodok.com - 20/Jan 12:23

Honor Watch GS 5 was launched in China yesterday with a more sophisticated and modern offering. This watch is suitable for both men and women for...

Honor Watch GS 5 Launched With Thin Body And 23-Day Battery

thecekodok.com - 20/Jan 12:23

Honor Watch GS 5 was launched in China yesterday with a more sophisticated and modern offering. This watch is suitable for both men and women for...