X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 15/Jul 07:09

Credential-Stealing OSS ‘Crystalray’ Attacks Jump 10X

Crystalray’s attack chain involves using various OSS tools for reconnaissance, scanning, and exploiting vulnerabilities. The group was first discovered in February using the “SSH-Snake” tool to exploit vulnerabilities in Atlassian Confluence. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira

itsecuritynews.info - 22/Aug 13:02

Atlassian has released patches for nine high-severity vulnerabilities in Bamboo, Confluence, Crowd, and Jira products. The post Atlassian Patches...

Sorry! Image not available at this time

Exploiting pfsense Flaw for Remote Code Execution

itsecuritynews.info - 14/Aug 08:02

During a recent security audit by Laburity researchers, an application with a vulnerability related to pfblockerNG was identified. Attempts using...

Sorry! Image not available at this time

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

itsecuritynews.info - 14/Aug 08:02

Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered...

Sorry! Image not available at this time

How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions

itsecuritynews.info - 19/Aug 10:02

An adversary could exploit these vulnerabilities by injecting malicious libraries into Microsoft’s applications to gain their entitlements and...

Sorry! Image not available at this time

Hackers Could Exploit Microsoft Teams on macOS to Steal Data

itsecuritynews.info - 20/Aug 13:03

Cisco Talos reveals 8 vulnerabilities in Microsoft’s macOS apps, exploiting TCC framework weaknesses. Hackers can bypass security, inject… This...

Sorry! Image not available at this time

PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model

itsecuritynews.info - 10:02

A PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, as well as other devices...

Sorry! Image not available at this time

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

itsecuritynews.info - 07:32

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links...

Sorry! Image not available at this time

CISA Warns of Hackers Abusing Cisco Smart Install Feature

itsecuritynews.info - 10/Aug 08:04

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has advised organizations to disable the legacy Cisco Smart Install (SMI) feature due...

Sorry! Image not available at this time

Leveraging Ancient Tactics for Modern Malware

itsecuritynews.info - 11:32

The HYAS Threat Intelligence team has detected threat actors using Steam for malicious activities, like hosting C2 domain addresses and exploiting...

Sorry! Image not available at this time

Qilin Caught Red-Handed Stealing Credentials in Google Chrome

itsecuritynews.info - 11:02

Browser credential harvesting is an unusual activity for a ransomware group This article has been indexed from www.infosecurity-magazine.com Read the...