X

Vous n'êtes pas connecté

  - THECYBERTHRONE.IN - A La Une - 22/Feb 11:58

XELERA Ransomware Dissection

The XELERA Ransomware campaign represents a sophisticated and targeted cyber threat that has recently exploited job seekers through deceptive tactics. Overview of the XELERA Ransomware Campaign Emergence and Tactics Infection Chain Initial Infection Second Stage Ransomware Deployment Final Stage Technical Analysis Key Components Indicators of Compromise (IoCs) Mitigation Measures Immediate Actions Long-Term Strategies Final Thoughts […]

Articles similaires

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks

bleepingcomputer.com - 25/Jun 20:34

A sophisticated malicious campaign that researchers call OneClik has been leveraging Microsoft's ClickOnce software deployment tool and custom Golang...

Sorry! Image not available at this time

XDigo Malware exploits a Zeroday vulnerability

thecyberthrone.in - 23/Jun 16:45

📌 1. Overview 💥 2. Infection Vector and Exploitation 🔓 Vulnerability Details: ⚙️ Multi-Stage Payload: 🔍 3. XDigo Technical...

Sorry! Image not available at this time

Malicious Copycat Repositories Emerge in Large Numbers on GitHub

itsecuritynews.info - 29/Jun 16:06

  The researchers at the National Cyber Security Agency have identified a sophisticated campaign that involved malicious actors uploading more than...

Sorry! Image not available at this time

Malicious Copycat Repositories Emerge in Large Numbers on GitHub

itsecuritynews.info - 29/Jun 16:06

  The researchers at the National Cyber Security Agency have identified a sophisticated campaign that involved malicious actors uploading more than...

Sorry! Image not available at this time

Chinese Hackers Deploying Pubload Malware by Weaponizing Tibetan Community Lures & Filenames

itsecuritynews.info - 26/Jun 10:32

A sophisticated cyberattack campaign targeting the Tibetan community has emerged, with China-aligned threat actors deploying advanced malware through...

Are interceptor drones Ukraine's best option against Russia?

times of india - 28/Jun 11:22

Faced with a surge in Russian drone attacks, Ukraine is exploring unconventional defense strategies, including interceptor drones. Russia has...

Are interceptor drones Ukraine's best option against Russia?

times of india - 28/Jun 11:22

Faced with a surge in Russian drone attacks, Ukraine is exploring unconventional defense strategies, including interceptor drones. Russia has...

Sorry! Image not available at this time

New macOS Malware Employs Process Injection and Remote Communications to Exfiltrate Keychain Credentials

itsecuritynews.info - 03/Jul 06:33

A sophisticated new macOS malware campaign has emerged targeting Web3 and cryptocurrency platforms, employing advanced techniques rarely seen in...