X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 21/Oct 07:04

AdaptixC2 Emerges in npm Supply-Chain Exploit Against Developers

Cybersecurity researchers at Kaspersky have uncovered a sophisticated supply chain attack targeting the npm ecosystem, where threat actors distributed the AdaptixC2 post-exploitation framework through a malicious package disguised as a legitimate proxy utility. The discovery highlights the growing risk of…

Articles similaires

Sorry! Image not available at this time

Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework

itsecuritynews.info - 21/Oct 21:34

The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting...

Sorry! Image not available at this time

Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys

itsecuritynews.info - 25/Oct 15:34

A sophisticated supply chain attack has emerged targeting cryptocurrency developers through the NuGet package ecosystem. Cybersecurity researchers...

Sorry! Image not available at this time

Malicious NuGet Packages Pose as Nethereum, Steal Crypto Wallet Keys

itsecuritynews.info - 24/Oct 08:05

Socket’s Threat Research Team has uncovered a sophisticated supply chain attack targeting cryptocurrency developers through the NuGet package...

Sorry! Image not available at this time

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach

itsecuritynews.info - 11:07

The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical first line of defense...

Sorry! Image not available at this time

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach

itsecuritynews.info - 11:07

The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical first line of defense...

Sorry! Image not available at this time

IT Security News Daily Summary 2025-10-21

itsecuritynews.info - 21/Oct 21:55

165 posts were published in the last hour 21:34 : Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework 21:34 :...

Sorry! Image not available at this time

IT Security News Hourly Summary 2025-10-22 00h : 5 posts

itsecuritynews.info - 21/Oct 22:05

5 posts were published in the last hour 21:55 : IT Security News Daily Summary 2025-10-21 21:34 : Threat Actors Leverage npm Ecosystem to Deliver...

Sorry! Image not available at this time

IT Security News Hourly Summary 2025-10-21 09h : 8 posts

itsecuritynews.info - 21/Oct 07:05

8 posts were published in the last hour 7:5 : Decoding UserAuthenticationMethod in Microsoft 365 audit logs: the bitfield mapping 7:4 : Vodafone To...

Sorry! Image not available at this time

Hackers Exploit WordPress Arbitrary Installation Vulnerabilities in the Wild

itsecuritynews.info - 25/Oct 17:34

Cybersecurity firm Wordfence has uncovered a renewed wave of mass exploitation targeting critical vulnerabilities in two popular WordPress plugins,...

Sorry! Image not available at this time

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

itsecuritynews.info - 30/Oct 17:34

The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are related to...