X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 11/May 22:03

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Unit 42 analyzes AD CS exploitation through template misconfigurations and shadow credential misuse while offering behavioral detection for defenders. The post Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools appeared first on Unit 42. This article has been…

Articles similaires

Sorry! Image not available at this time

IT Security News Hourly Summary 2026-05-12 00h : 3 posts

itsecuritynews.info - 11/May 22:05

3 posts were published in the last hour 22:3 : Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools 22:3 : Google Says Hackers Used...

Sorry! Image not available at this time

The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

itsecuritynews.info - 02/May 00:32

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The...

Sorry! Image not available at this time

The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)

itsecuritynews.info - 02/May 00:32

Unit 42 analyzes npm supply chain evolution post-Shai Hulud. Discover wormable malware, CI/CD persistence, multi-stage attacks and more. The post The...

Sorry! Image not available at this time

Rustinel: Open-source endpoint detection for Windows and Linux

itsecuritynews.info - 11/May 06:02

Open-source endpoint detection has long been split between Windows-focused tools built around Sysmon and Linux tools built around eBPF or auditd....

Sorry! Image not available at this time

Top 10 Best Interactive Malware Analysis Tools in 2026

itsecuritynews.info - 11/May 05:04

As we navigate through 2026, the cybersecurity landscape has never been more complex. Threat actors are actively leveraging advanced AI, highly...

Sorry! Image not available at this time

Essential Data Sources for Detection Beyond the Endpoint

itsecuritynews.info - 01/May 23:09

Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data...

Sorry! Image not available at this time

Essential Data Sources for Detection Beyond the Endpoint

itsecuritynews.info - 01/May 23:09

Unit 42 highlights the need for a comprehensive security strategy that spans every IT zone. Explore the full details here. The post Essential Data...

Sorry! Image not available at this time

Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities

itsecuritynews.info - 05/May 00:02

TrendAI™ Research breaks down Quasar Linux (QLNX), a previously undocumented sophisticated Linux RAT with low detection rates. In this blog, we...

Sorry! Image not available at this time

Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities

itsecuritynews.info - 05/May 00:02

TrendAI™ Research breaks down Quasar Linux (QLNX), a previously undocumented sophisticated Linux RAT with low detection rates. In this blog, we...

Sorry! Image not available at this time

Cyber Briefing: 2026.05.07

itsecuritynews.info - 07/May 14:34

Cybercriminals are increasingly exploiting AI-related trust through malware-laden installers and filter-evasive phishing, while a major supply chain...