X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 13/Oct 11:32

Astaroth Trojan abuses GitHub to host configs and evade takedowns

The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee discovered a new Astaroth campaign using GitHub repositories to host malware configurations. This allows attackers to…

Articles similaires

Sorry! Image not available at this time

Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors

itsecuritynews.info - 18/Oct 14:32

  A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials,...

Sorry! Image not available at this time

Astaroth Malware Adopts GitHub Infrastructure to Target Crypto Investors

itsecuritynews.info - 18/Oct 14:32

  A new attack is now underway involving the notorious Astaroth banking Trojan, a banking Trojan which is used to steal cryptocurrency credentials,...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 67

securityaffairs.co - 19/Oct 13:54

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...

Sorry! Image not available at this time

New Herodotus Android malware fakes human typing to avoid detection

bleepingcomputer.com - 10:00

A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade...

Sorry! Image not available at this time

New Herodotus Android malware fakes human typing to avoid detection

bleepingcomputer.com - 10:00

A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade...

Sorry! Image not available at this time

New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence

itsecuritynews.info - 05:34

A sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive...

Sorry! Image not available at this time

Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution

itsecuritynews.info - 15/Oct 13:03

A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It delivered a new Maverick banker, which...

Sorry! Image not available at this time

Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution

itsecuritynews.info - 15/Oct 13:03

A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It delivered a new Maverick banker, which...