X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 22/02/2025 11:58

XELERA Ransomware Dissection

The XELERA Ransomware campaign represents a sophisticated and targeted cyber threat that has recently exploited job seekers through deceptive tactics. Overview of the XELERA Ransomware Campaign Emergence and Tactics Infection Chain Initial Infection Second Stage Ransomware Deployment Final Stage Technical Analysis Key Components Indicators of Compromise (IoCs) Mitigation Measures Immediate Actions Long-Term Strategies Final Thoughts […]

Articles similaires

Sorry! Image not available at this time

Hackers Exploit Visual Studio Code to Deploy Malicious Payloads on Victim Systems

itsecuritynews.info - 21/Jan 06:38

The attack arsenal by extensively abusing Microsoft Visual Studio Code configuration files to deliver and execute malicious payloads on compromised...

Sorry! Image not available at this time

Hackers Exploit Visual Studio Code to Deploy Malicious Payloads on Victim Systems

itsecuritynews.info - 21/Jan 06:38

The attack arsenal by extensively abusing Microsoft Visual Studio Code configuration files to deliver and execute malicious payloads on compromised...

Sorry! Image not available at this time

Korean Air Employee Data Exposed in Cl0p Ransomware Supply-Chain Attack

itsecuritynews.info - 15/Jan 14:32

  Korean Air has acknowledged the theft of sensitive data belonging to 30,000 current and former employees in a serious data breach. The breach...

Sorry! Image not available at this time

Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

itsecuritynews.info - 06:02

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations...

Sorry! Image not available at this time

Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

itsecuritynews.info - 06:02

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations...

Sorry! Image not available at this time

Uganda decides: Inside the campaign tactics shaping 2026

mg.co.za - 13/Jan 08:49

As Ugandans go to the polls on 15 January 2026, the results will reveal not only who has won political power, but which campaign strategies resonated...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

itsecuritynews.info - 19/Jan 14:36

A newly analyzed campaign dubbed “Evelyn Stealer” is turning the Visual Studio Code (VSC) extension ecosystem into an attack delivery platform,...

Sorry! Image not available at this time

Visual Studio Code Abused in Sophisticated Multistage Malware Attacks

itsecuritynews.info - 19/Jan 14:36

A newly analyzed campaign dubbed “Evelyn Stealer” is turning the Visual Studio Code (VSC) extension ecosystem into an attack delivery platform,...