X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 09/Jan 20:07

MAESTRO Toolkit Exploiting VMware VM Escape Vulnerabilities

Cybersecurity researchers from Huntress detail a major VM Escape attack where hackers took over host servers. Using a secret toolkit called MAESTRO, the attackers stayed hidden for over a year. Read the exclusive details on how this breach was stopped…

Articles similaires

Sorry! Image not available at this time

Hackers expose Victorian student details in data breach

ia.acs.org.au - 15/Jan 01:57

Over 665,000 students could face identity theft risk.

Sorry! Image not available at this time

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

itsecuritynews.info - 20/Jan 05:16

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access...

Sorry! Image not available at this time

Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host

itsecuritynews.info - 20/Jan 05:16

A critical zero-day vulnerability in Cloudflare’s Web Application Firewall (WAF) allowed attackers to bypass security controls and directly access...

Sorry! Image not available at this time

Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks

bleepingcomputer.com - 16/Jan 10:29

Attackers are now exploiting a critical Fortinet FortiSIEM vulnerability with publicly available proof-of-concept exploit code. [...]

Sorry! Image not available at this time

New China Linked VoidLink Linux Malware Targets Major Cloud Providers

itsecuritynews.info - 14/Jan 19:06

Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this...

Sorry! Image not available at this time

Telegram-based illicit billionaire marketplace Tudou Guarantee stopped transactions

securityaffairs.co - 20/Jan 09:45

Major Telegram-based illicit marketplace Tudou Guarantee appears to be shutting down its operations, according to Elliptic. Blockchain cybersecurity...

Sorry! Image not available at this time

ClickFix to CrashFix: KongTuke Used Fake Chrome Ad Blocker to Install ModeloRAT

itsecuritynews.info - 20/Jan 18:05

Huntress discovers ‘CrashFix,’ a new attack by KongTuke hacker group using fake ad blockers to crash browsers and trick office workers into...

Sorry! Image not available at this time

ClickFix to CrashFix: KongTuke Used Fake Chrome Ad Blocker to Install ModeloRAT

itsecuritynews.info - 20/Jan 18:05

Huntress discovers ‘CrashFix,’ a new attack by KongTuke hacker group using fake ad blockers to crash browsers and trick office workers into...

Sorry! Image not available at this time

Chainlit AI framework bugs let hackers breach cloud environments

bleepingcomputer.com - 21/Jan 22:37

Two high-severity vulnerabilities in Chainlit, a popular open-source framework for building conversational AI applications, allow reading any file on...

Sorry! Image not available at this time

Chainlit AI framework bugs let hackers breach cloud environments

bleepingcomputer.com - 21/Jan 22:37

Two high-severity vulnerabilities in Chainlit, a popular open-source framework for building conversational AI applications, allow reading any file on...