X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 31/12/2024 13:06

DeepDLL– A New Approach to Detect Malicious DLLs

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

Articles similaires

Sorry! Image not available at this time

16 Fake ChatGPT Extensions Caught Hijacking User Accounts

itsecuritynews.info - 27/Jan 18:10

A coordinated campaign of 16 malicious GPT optimisers has been caught hijacking ChatGPT accounts. These tools steal session tokens to access private...

Sorry! Image not available at this time

16 Fake ChatGPT Extensions Caught Hijacking User Accounts

itsecuritynews.info - 27/Jan 18:10

A coordinated campaign of 16 malicious GPT optimisers has been caught hijacking ChatGPT accounts. These tools steal session tokens to access private...

Sorry! Image not available at this time

Open VSX Supply Chain Breach Delivers GlassWorm Malware Through Trusted Developer Extensions

itsecuritynews.info - 02/Feb 16:12

  Cybersecurity experts have uncovered a supply chain compromise targeting the Open VSX Registry, where unknown attackers abused a legitimate...

Sorry! Image not available at this time

MoltBot Skills exploited to distribute 400+ malware packages in days

itsecuritynews.info - 02/Feb 22:34

Over 400 malicious OpenClaw packages were uploaded in days, using MoltBot skills to spread password-stealing malware. Researchers uncovered a large...

Sorry! Image not available at this time

Hugging Face Repositories Abused in New Android Malware Campaign

itsecuritynews.info - 02/Feb 16:12

Attackers exploited Hugging Face’s trusted infrastructure to spread an Android RAT, using fake security apps and thousands of malware variants. The...

Sorry! Image not available at this time

Gakido CRLF Injection Vulnerability Let Attackers Bypass Security Controls

itsecuritynews.info - 02/Feb 14:13

A critical vulnerability in Gakido, an HTTP client library by HappyHackingSpace, has been discovered that allows attackers to inject arbitrary HTTP...

Sorry! Image not available at this time

MoltBot Skills exploited to distribute 400+ malware packages in days

securityaffairs.co - 02/Feb 21:29

Over 400 malicious OpenClaw packages were uploaded in days, using MoltBot skills to spread password-stealing malware. Researchers uncovered a large...

Sorry! Image not available at this time

Machine learning–powered Android Trojans bypass script-based Ad Click detection

securityaffairs.co - 22/Jan 19:19

A new Android click-fraud trojan family uses TensorFlow ML to visually detect and tap ads, bypassing traditional script-based click techniques....

Sorry! Image not available at this time

The Winter Olympics Are Back, and So Are Attackers

itsecuritynews.info - 11:32

The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter...

Sorry! Image not available at this time

The Winter Olympics Are Back, and So Are Attackers

itsecuritynews.info - 11:32

The Olympics have traditionally been a major attack vector for cyber disruption, espionage, and financially motivated attacks.   The 2018 Winter...