X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 22/02/2025 11:58

XELERA Ransomware Dissection

The XELERA Ransomware campaign represents a sophisticated and targeted cyber threat that has recently exploited job seekers through deceptive tactics. Overview of the XELERA Ransomware Campaign Emergence and Tactics Infection Chain Initial Infection Second Stage Ransomware Deployment Final Stage Technical Analysis Key Components Indicators of Compromise (IoCs) Mitigation Measures Immediate Actions Long-Term Strategies Final Thoughts […]

Articles similaires

Sorry! Image not available at this time

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

itsecuritynews.info - 24/Jan 09:05

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations...

Sorry! Image not available at this time

Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

itsecuritynews.info - 24/Jan 09:05

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations...

Sorry! Image not available at this time

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

itsecuritynews.info - 24/Jan 15:09

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations,...

Sorry! Image not available at this time

Researchers Uncover Multi-Stage AiTM Attack Using SharePoint to Bypass Security Controls

itsecuritynews.info - 24/Jan 15:09

Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations,...

Sorry! Image not available at this time

Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware

itsecuritynews.info - 09:32

A newly discovered campaign demonstrates a sophisticated approach to delivering information-stealing malware through a combination of social...

Sorry! Image not available at this time

Hackers Exploit Visual Studio Code to Deploy Malicious Payloads on Victim Systems

itsecuritynews.info - 21/Jan 06:38

The attack arsenal by extensively abusing Microsoft Visual Studio Code configuration files to deliver and execute malicious payloads on compromised...

Sorry! Image not available at this time

Hackers Exploit Visual Studio Code to Deploy Malicious Payloads on Victim Systems

itsecuritynews.info - 21/Jan 06:38

The attack arsenal by extensively abusing Microsoft Visual Studio Code configuration files to deliver and execute malicious payloads on compromised...

Sorry! Image not available at this time

Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint

securityaffairs.co - 26/Jan 12:38

Microsoft warns of a multi-stage phishing and BEC campaign hitting energy firms, abusing SharePoint links and inbox rules to steal credentials....

Sorry! Image not available at this time

Korean Air Employee Data Exposed in Cl0p Ransomware Supply-Chain Attack

itsecuritynews.info - 15/Jan 14:32

  Korean Air has acknowledged the theft of sensitive data belonging to 30,000 current and former employees in a serious data breach. The breach...

Sorry! Image not available at this time

Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

itsecuritynews.info - 22/Jan 06:02

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations...