X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 30/Oct 17:34

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to Russian ransomware gangs. AdaptixC2 is an emerging extensible post-exploitation and adversarial emulation framework designed for penetration…

Articles similaires

Sorry! Image not available at this time

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

itsecuritynews.info - 30/Oct 17:34

The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to...

Sorry! Image not available at this time

Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework

itsecuritynews.info - 21/Oct 21:34

The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting...

Sorry! Image not available at this time

IT Security News Daily Summary 2025-10-21

itsecuritynews.info - 21/Oct 21:55

165 posts were published in the last hour 21:34 : Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework 21:34 :...

Sorry! Image not available at this time

IT Security News Hourly Summary 2025-10-22 00h : 5 posts

itsecuritynews.info - 21/Oct 22:05

5 posts were published in the last hour 21:55 : IT Security News Daily Summary 2025-10-21 21:34 : Threat Actors Leverage npm Ecosystem to Deliver...

Sorry! Image not available at this time

Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset

itsecuritynews.info - 22/Oct 23:04

Cloud account takeover attacks have evolved into a sophisticated threat as cybercriminals and state-sponsored actors increasingly weaponize OAuth...

Sorry! Image not available at this time

CISA: High-severity Linux flaw now exploited by ransomware gangs

bleepingcomputer.com - 31/Oct 13:05

CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks. [...]

Sorry! Image not available at this time

CISA: High-severity Linux flaw now exploited by ransomware gangs

bleepingcomputer.com - 31/Oct 13:05

CISA confirmed on Thursday that a high-severity privilege escalation flaw in the Linux kernel is now being exploited in ransomware attacks. [...]

Sorry! Image not available at this time

Reaper – Unified Application Security Testing with AI Support

itsecuritynews.info - 27/Oct 23:34

Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and AI-agent workflows for penetration testers and red teams....

Sorry! Image not available at this time

Reaper – Unified Application Security Testing with AI Support

itsecuritynews.info - 27/Oct 23:34

Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and AI-agent workflows for penetration testers and red teams....

Sorry! Image not available at this time

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

itsecuritynews.info - 01/Nov 06:06

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities...