X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 22/Feb 11:58

XELERA Ransomware Dissection

The XELERA Ransomware campaign represents a sophisticated and targeted cyber threat that has recently exploited job seekers through deceptive tactics. Overview of the XELERA Ransomware Campaign Emergence and Tactics Infection Chain Initial Infection Second Stage Ransomware Deployment Final Stage Technical Analysis Key Components Indicators of Compromise (IoCs) Mitigation Measures Immediate Actions Long-Term Strategies Final Thoughts […]

Articles similaires

Sorry! Image not available at this time

Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware

itsecuritynews.info - 14/Oct 19:32

Cybercriminals have developed a sophisticated phishing campaign targeting Colombian users through fake judicial notifications, deploying a complex...

Sorry! Image not available at this time

Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware

itsecuritynews.info - 14/Oct 19:32

Cybercriminals have developed a sophisticated phishing campaign targeting Colombian users through fake judicial notifications, deploying a complex...

Sorry! Image not available at this time

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

itsecuritynews.info - 09/Oct 21:02

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and responsibilities...

Sorry! Image not available at this time

Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

itsecuritynews.info - 21/Oct 19:05

A sophisticated phishing campaign orchestrated by Pakistan-linked threat actors has been discovered targeting Indian government entities by...

Sorry! Image not available at this time

Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials

itsecuritynews.info - 09/Oct 21:03

A sophisticated phishing campaign has emerged targeting job seekers through legitimate Zoom document-sharing features, demonstrating how...

Sorry! Image not available at this time

Operation Silk Lure: Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery

itsecuritynews.info - 16/Oct 13:03

A targeted cyber-espionage campaign exploiting Windows Scheduled Tasks and DLL side-loading to deploy the sophisticated ValleyRAT backdoor. The...

Sorry! Image not available at this time

Operation Silk Lure: Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery

itsecuritynews.info - 16/Oct 13:03

A targeted cyber-espionage campaign exploiting Windows Scheduled Tasks and DLL side-loading to deploy the sophisticated ValleyRAT backdoor. The...

Sorry! Image not available at this time

Operation Zero Disco: Cisco SNMP Vulnerability Exploited

thecyberthrone.in - 16/Oct 15:01

A new and highly sophisticated cyberattack campaign, dubbed Operation Zero Disco by Trend Micro researchers, is actively exploiting a critical...

Sorry! Image not available at this time

Operation Zero Disco: Cisco SNMP Vulnerability Exploited

thecyberthrone.in - 16/Oct 15:01

A new and highly sophisticated cyberattack campaign, dubbed Operation Zero Disco by Trend Micro researchers, is actively exploiting a critical...

Sorry! Image not available at this time

Microsoft Warns of Hackers Compromising Employee Accounts to Steal Salary Payments

itsecuritynews.info - 10/Oct 09:32

A sophisticated financially motivated threat actor known as Storm-2657 has been orchestrating elaborate “payroll pirate” attacks targeting US...