X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 18/Mar 06:36

Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader

A newly discovered malware campaign is exploiting user trust in Telegram by distributing a trojanized installer through a typosquatted website, telegrgam[.]com. The site closely mimics the official Telegram download portal and delivers a malicious executable named tsetup-x64.6.exe, making it appear legitimate…

Articles similaires

Sorry! Image not available at this time

Fake Telegram Download Site Delivers Stealthy In-Memory Malware Loader

itsecuritynews.info - 18/Mar 06:36

A newly discovered malware campaign is exploiting user trust in Telegram by distributing a trojanized installer through a typosquatted website,...

Sorry! Image not available at this time

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

itsecuritynews.info - 09/Mar 19:09

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and...

Sorry! Image not available at this time

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

itsecuritynews.info - 09/Mar 19:09

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and...

Sorry! Image not available at this time

Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution

itsecuritynews.info - 19/Mar 14:07

A malicious Python package named pyronut has been discovered on the Python Package Index (PyPI), targeting developers who build Telegram bots by...

Sorry! Image not available at this time

Malicious ‘Pyronut’ Package Backdoors Telegram Bots With Remote Code Execution

itsecuritynews.info - 19/Mar 14:07

A malicious Python package named pyronut has been discovered on the Python Package Index (PyPI), targeting developers who build Telegram bots by...

Sorry! Image not available at this time

LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

bleepingcomputer.com - 17/Mar 12:09

The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on...

Sorry! Image not available at this time

LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

bleepingcomputer.com - 17/Mar 12:09

The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on...

Sorry! Image not available at this time

Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries

itsecuritynews.info - 20/Mar 05:09

We look into a stealthy multi‑stage attack campaign that delivers PureLog Stealer entirely in memory using encrypted, fileless techniques. This...

Sorry! Image not available at this time

Copyright Lures Mask a Multi‑Stage PureLog Stealer Attack on Key Industries

itsecuritynews.info - 20/Mar 05:09

We look into a stealthy multi‑stage attack campaign that delivers PureLog Stealer entirely in memory using encrypted, fileless techniques. This...

Sorry! Image not available at this time

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

bleepingcomputer.com - 10/Mar 15:01

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious...