X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 22/02/2025 11:58

XELERA Ransomware Dissection

The XELERA Ransomware campaign represents a sophisticated and targeted cyber threat that has recently exploited job seekers through deceptive tactics. Overview of the XELERA Ransomware Campaign Emergence and Tactics Infection Chain Initial Infection Second Stage Ransomware Deployment Final Stage Technical Analysis Key Components Indicators of Compromise (IoCs) Mitigation Measures Immediate Actions Long-Term Strategies Final Thoughts […]

Articles similaires

Sorry! Image not available at this time

LeakNet Ransomware Dissection

thecyberthrone.in - 20/Mar 13:57

LeakNet is an emerging ransomware operator that entered the threat landscape in late 2024. Averaging about three victims per month, the group is now...

Sorry! Image not available at this time

LeakNet Ransomware Dissection

thecyberthrone.in - 20/Mar 13:57

LeakNet is an emerging ransomware operator that entered the threat landscape in late 2024. Averaging about three victims per month, the group is now...

Sorry! Image not available at this time

Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics

itsecuritynews.info - 19/Mar 14:07

A well-known banking trojan called Horabot has resurfaced in an active campaign targeting users across Mexico, combining a multi-stage infection chain...

Sorry! Image not available at this time

Horabot Banking Trojan Resurfaces in Mexico With Multi-Stage Phishing and Email Worm Tactics

itsecuritynews.info - 19/Mar 14:07

A well-known banking trojan called Horabot has resurfaced in an active campaign targeting users across Mexico, combining a multi-stage infection chain...

Sorry! Image not available at this time

Hackers Compromise Trivy Scanner to Inject malicious Scripts and Steal Login Credentials

itsecuritynews.info - 21/Mar 17:32

A sophisticated supply chain attack targeting the official Trivy GitHub Action (aquasecurity/trivy-action) has compromised continuous integration and...

Sorry! Image not available at this time

Hackers Compromise Trivy Scanner to Inject malicious Scripts and Steal Login Credentials

itsecuritynews.info - 21/Mar 17:32

A sophisticated supply chain attack targeting the official Trivy GitHub Action (aquasecurity/trivy-action) has compromised continuous integration and...

Sorry! Image not available at this time

Malicious Script Injection in Trivy Compromise Enables Credential Theft

itsecuritynews.info - 21/Mar 10:34

A sophisticated supply chain attack targeting the official Trivy GitHub Action (aquasecurity/trivy-action) has compromised continuous integration and...

Sorry! Image not available at this time

Malicious Script Injection in Trivy Compromise Enables Credential Theft

itsecuritynews.info - 21/Mar 10:34

A sophisticated supply chain attack targeting the official Trivy GitHub Action (aquasecurity/trivy-action) has compromised continuous integration and...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...