X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 31/12/2024 13:06

DeepDLL– A New Approach to Detect Malicious DLLs

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

Articles similaires

Sorry! Image not available at this time

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

itsecuritynews.info - 20/Mar 17:35

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly innocuous JPEG image files....

Sorry! Image not available at this time

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

itsecuritynews.info - 19/Mar 08:11

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA...

Sorry! Image not available at this time

New Windows zero-day leaks NTLM hashes, gets unofficial patch

bleepingcomputer.com - 25/Mar 18:22

Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking...

Sorry! Image not available at this time

New Windows zero-day leaks NTLM hashes, gets unofficial patch

bleepingcomputer.com - 25/Mar 18:22

Free unofficial patches are available for a new Windows zero-day vulnerability that can let remote attackers steal NTLM credentials by tricking...

Sorry! Image not available at this time

FBI warns of malicious free online document converters spreading malware

securityaffairs.co - 24/Mar 08:14

The FBI warns of a significant increase in scams involving free online document converters to infect users with malware. The FBI warns that threat...

Sorry! Image not available at this time

5 Unexpected Devices You Didn’t Know Could Spread Malware

itsecuritynews.info - 24/Mar 20:32

When you think of malware, your mind probably jumps to malicious downloads or email attachments. But it turns… This article has been indexed from...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

Threat Assessment: GitHub Actions Supply Chain Attack: The Compromise of tj-actions/changed-files

itsecuritynews.info - 18/Mar 21:14

A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise...

Sorry! Image not available at this time

Threat Assessment: GitHub Actions Supply Chain Attack: The Compromise of tj-actions/changed-files

itsecuritynews.info - 18/Mar 21:14

A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise...