X

Vous n'êtes pas connecté

Rubriques :

  - ITSECURITYNEWS.INFO - A La Une - 15/07/2024 07:09

Credential-Stealing OSS ‘Crystalray’ Attacks Jump 10X

Crystalray’s attack chain involves using various OSS tools for reconnaissance, scanning, and exploiting vulnerabilities. The group was first discovered in February using the “SSH-Snake” tool to exploit vulnerabilities in Atlassian Confluence. This article has been indexed from Cyware News –…

Articles similaires

Sorry! Image not available at this time

Linux flaws chain allows Root access across major distributions

securityaffairs.co - 20/Jun 09:22

Researchers discovered two local privilege escalation flaws that could let attackers gain root access on systems running major Linux distributions....

Sorry! Image not available at this time

Linux flaws chain allows Root access across major distributions

securityaffairs.co - 20/Jun 09:22

Researchers discovered two local privilege escalation flaws that could let attackers gain root access on systems running major Linux distributions....

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

itsecuritynews.info - 27/Jun 20:34

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

Sorry! Image not available at this time

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

securityaffairs.co - 01/Jul 07:15

U.S. warns of rising Iranian cyber threats exploiting outdated software and weak passwords, with attacks likely to escalate due to recent events. U.S....

Sorry! Image not available at this time

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

securityaffairs.co - 01/Jul 07:15

U.S. warns of rising Iranian cyber threats exploiting outdated software and weak passwords, with attacks likely to escalate due to recent events. U.S....

Sorry! Image not available at this time

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools

itsecuritynews.info - 19:32

Cybercriminals have intensified their assault on poorly managed Linux SSH servers, deploying sophisticated proxy tools to establish covert network...

Sorry! Image not available at this time

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools

itsecuritynews.info - 19:32

Cybercriminals have intensified their assault on poorly managed Linux SSH servers, deploying sophisticated proxy tools to establish covert network...

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

securityaffairs.co - 27/Jun 19:37

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

securityaffairs.co - 27/Jun 19:37

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

Sorry! Image not available at this time

Snake Keyloggers Exploit Java Utilities to Evade Detection by Security Tools

itsecuritynews.info - 01/Jul 18:09

The S2 Group Intelligence team has uncovered a Russian-origin malware known as Snake Keylogger, a stealer coded in .NET, leveraging legitimate Java...