X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 31/12/2024 13:06

DeepDLL– A New Approach to Detect Malicious DLLs

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

Articles similaires

Sorry! Image not available at this time

Notepad++ fixed updater bugs that allowed malicious update hijacking

itsecuritynews.info - 12/Dec 23:04

Notepad++ addressed an updater vulnerability that allows attackers hijack update traffic due to weak file authentication. Notepad++ addressed a flaw...

Sorry! Image not available at this time

Notepad++ fixed updater bugs that allowed malicious update hijacking

itsecuritynews.info - 12/Dec 23:04

Notepad++ addressed an updater vulnerability that allows attackers hijack update traffic due to weak file authentication. Notepad++ addressed a flaw...

Sorry! Image not available at this time

Notepad++ fixed updater bugs that allowed malicious update hijacking

securityaffairs.co - 12/Dec 22:16

Notepad++ addressed an updater vulnerability that allows attackers hijack update traffic due to weak file authentication. Notepad++ addressed a flaw...

Sorry! Image not available at this time

Notepad++ fixed updater bugs that allowed malicious update hijacking

securityaffairs.co - 12/Dec 22:16

Notepad++ addressed an updater vulnerability that allows attackers hijack update traffic due to weak file authentication. Notepad++ addressed a flaw...

Sorry! Image not available at this time

Fake ‘One Battle After Another’ torrent hides malware in subtitles

bleepingcomputer.com - 12/Dec 17:12

A fake torrent for Leonardo DiCaprio's 'One Battle After Another' hides malicious PowerShell malware loaders inside subtitle files that ultimately...

Sorry! Image not available at this time

Contagious Interview campaign expands with 197 npm Ppackages spreading new OtterCookie malware

itsecuritynews.info - 30/Nov 02:04

North Korea-linked actors behind Contagious Interview uploaded 197 new malicious npm packages to distribute a new OtterCookie malware version. North...

Sorry! Image not available at this time

Contagious Interview campaign expands with 197 npm Ppackages spreading new OtterCookie malware

itsecuritynews.info - 30/Nov 02:04

North Korea-linked actors behind Contagious Interview uploaded 197 new malicious npm packages to distribute a new OtterCookie malware version. North...

Sorry! Image not available at this time

Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely

itsecuritynews.info - 05/Dec 08:32

A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code...

Sorry! Image not available at this time

Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely

itsecuritynews.info - 05/Dec 08:32

A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code...