X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 01/Apr 13:11

Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns

Hackers are abusing the Ethereum blockchain to hide and control a new Node.js backdoor called EtherRAT, using a stealthy technique known as EtherHiding to make their command‑and‑control (C2) infrastructure difficult to disrupt. EtherRAT, previously profiled by Sysdig and linked to…

Articles similaires

Sorry! Image not available at this time

Ethereum-Based EtherRAT, EtherHiding Power Stealthy Malware Campaigns

itsecuritynews.info - 01/Apr 13:11

Hackers are abusing the Ethereum blockchain to hide and control a new Node.js backdoor called EtherRAT, using a stealthy technique known as...

Sorry! Image not available at this time

Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics

itsecuritynews.info - 08/Apr 21:07

APT28 targets Ukraine and allies with PRISMEX malware, using stealthy techniques for espionage and command-and-control. Russia-linked group APT28 (aka...

Sorry! Image not available at this time

Hackers Use ClickFix Lure to Drop Node.js-Based Windows RAT With Tor-Powered C2

itsecuritynews.info - 07/Apr 18:09

A fresh wave of cyberattacks is targeting Windows users through a deceptive social engineering technique called ClickFix. Attackers use a fake browser...

Sorry! Image not available at this time

Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics

securityaffairs.co - 08/Apr 20:23

APT28 targets Ukraine and allies with PRISMEX malware, using stealthy techniques for espionage and command-and-control. Russia-linked group APT28 (aka...

Sorry! Image not available at this time

GitHub-Backed Malware Spread via LNK Files in South Korea

itsecuritynews.info - 06/Apr 12:36

Hackers are abusing Windows shortcut files and GitHub to run a stealthy, multi‑stage malware campaign against organizations in South Korea. The...

Sorry! Image not available at this time

Threat Actors Exploit GitHub as C2 in Multi-Stage Attacks Attacking Organizations in South Korea

itsecuritynews.info - 07/Apr 19:34

GitHub attacked by state-sponsored hackers  Cyber criminals possibly linked with the Democratic People’s Republic of Korea (DPRK) have been found...

Sorry! Image not available at this time

Internet-Exposed ICS Devices Raise Alarm for Critical Sectors

securityaffairs.co - 09/Apr 07:20

Exposed ICS devices and insecure protocols like Modbus increase risks to critical infrastructure, enabling disruption, data access, and potential...

Sorry! Image not available at this time

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

securityaffairs.co - 03/Apr 07:52

Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group...

Sorry! Image not available at this time

IT Security News Hourly Summary 2026-04-08 12h : 14 posts

itsecuritynews.info - 08/Apr 10:05

14 posts were published in the last hour 9:38 : New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto 9:38 : GreyNoise Launches C2...

Sorry! Image not available at this time

Phishing LNK files and GitHub C2 power new DPRK cyber attacks

securityaffairs.co - 06/Apr 19:34

DPRK-linked hackers use GitHub C2s, starting attacks via phishing LNK files that drop a PDF and PowerShell script in South Korea. North Korea-linked...