X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 15/Jul 07:09

Credential-Stealing OSS ‘Crystalray’ Attacks Jump 10X

Crystalray’s attack chain involves using various OSS tools for reconnaissance, scanning, and exploiting vulnerabilities. The group was first discovered in February using the “SSH-Snake” tool to exploit vulnerabilities in Atlassian Confluence. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Silent Intrusions: Godzilla Fileless Backdoors Targeting Atlassian Confluence

itsecuritynews.info - 30/Aug 09:32

Trend Micro discovered that old Atlassian Confluence versions that were affected by CVE-2023-22527 are being exploited using a new in-memory fileless...

Sorry! Image not available at this time

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns

itsecuritynews.info - 30/Aug 09:32

Threat actors are actively exploiting a critical flaw in the Atlassian Confluence Data Center and Confluence Server in cryptocurrency mining...

Sorry! Image not available at this time

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns

securityaffairs.co - 30/Aug 08:12

Threat actors are actively exploiting a critical flaw in the Atlassian Confluence Data Center and Confluence Server in cryptocurrency mining...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

Godzilla Fileless Backdoors Targeting Atlassian Confluence

itsecuritynews.info - 31/Aug 06:32

The Godzilla fileless backdoor relies on a complex series of actions, such as cryptographic operations, class loading, and dynamic injection, to...

Sorry! Image not available at this time

Fog Ransomware Now Targeting the Financial Sector

itsecuritynews.info - 07/Sep 07:32

Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network defenses. After infiltration, Fog...

Sorry! Image not available at this time

Fog Ransomware Now Targeting the Financial Sector

itsecuritynews.info - 07/Sep 07:32

Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network defenses. After infiltration, Fog...

Sorry! Image not available at this time

Third-Party Risk Management is Under the Spotlight

itsecuritynews.info - 30/Aug 14:32

Third-party risk management is a critical issue in the wake of the CrowdStrike IT outage, revealing vulnerabilities within financial institutions...

Sorry! Image not available at this time

Researcher Finds Unfixable Yet Tricky to Exploit Flaw in Yubikeys

itsecuritynews.info - 05/Sep 11:32

A security flaw exploiting side channel attacks means some Yubikeys can be cloned This article has been indexed from www.infosecurity-magazine.com...