X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 13/Jul 07:09

Coyote Banking Trojan Targets LATAM with a Focus on Brazilian Financial Institutions

A .NET banking Trojan named Coyote has been identified as a threat to Brazilian financial institutions. It uses a unique execution chain involving the abuse of legitimate software to harvest user financial information. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

A Deep Dive Into a New ValleyRAT Campaign Targeting Chinese Speakers

itsecuritynews.info - 17/Aug 07:32

The malware masquerades as legitimate applications like Microsoft Office and creates an empty file to lure users. It also checks for virtual machines...

Sorry! Image not available at this time

Leveraging Ancient Tactics for Modern Malware

itsecuritynews.info - 23/Aug 11:32

The HYAS Threat Intelligence team has detected threat actors using Steam for malicious activities, like hosting C2 domain addresses and exploiting...

Sorry! Image not available at this time

Exploiting pfsense Flaw for Remote Code Execution

itsecuritynews.info - 14/Aug 08:02

During a recent security audit by Laburity researchers, an application with a vulnerability related to pfblockerNG was identified. Attempts using...

Sorry! Image not available at this time

Cthulhu Stealer Malware Targets macOS With Deceptive Tactics

itsecuritynews.info - 22/Aug 15:32

Cthulhu Stealer targets macOS, posing a major threat by disguising as legitimate software via DMG files This article has been indexed from...

Sorry! Image not available at this time

C-Suite Involvement in Cybersecurity is Little More Than Lip Service

itsecuritynews.info - 26/Aug 09:31

The C-suite’s lack of engagement in cybersecurity poses a significant risk despite the growing threat landscape. Organizations need to prioritize...

Sorry! Image not available at this time

Researchers Discover Over 20 Supply Chain Vulnerabilities in MLOps Platforms

itsecuritynews.info - 11:32

Inherent vulnerabilities stem from the underlying formats and processes of the technology, allowing attackers to exploit features like automatic code...

Sorry! Image not available at this time

Update: Researcher Publishes PoC Exploit for Zero-Click Windows RCE Threat

itsecuritynews.info - 12:32

A security researcher has published a proof-of-concept exploit for a critical zero-click vulnerability, CVE-2024-38063, in Windows TCP/IP. This flaw...

Sorry! Image not available at this time

South Korean APT Group Exploits WPS Office Zero-Day for Espionage

itsecuritynews.info - 11:02

ESET uncovered a new cyber-espionage campaign tied to a South Korean APT group that used a remote code execution (RCE) vulnerability in WPS Office for...

Sorry! Image not available at this time

Stealthy ‘sedexp’ Linux Malware Evaded Detection for Two Years

itsecuritynews.info - 26/Aug 12:02

A sophisticated Linux malware called ‘sedexp’ has been flying under the radar since 2022, utilizing a unique persistence technique not yet...

Sorry! Image not available at this time

Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning

itsecuritynews.info - 23/Aug 08:32

Researchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan Microelectronics, enabling attackers...