X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 24/01/2025 11:10

Magic packet Backdoor affects Junos OS

The “magic packet” backdoor, recently uncovered, is a sophisticated piece of malware targeting enterprise VPN gateways. This particular backdoor, known as J-Magic, has been primarily found on Juniper Network’s Junos OS. This malware is notable for its stealth and advanced activation mechanism, which involves a specific “magic packet” hidden within normal TCP traffic. Key Characteristics […]

Articles similaires

Sorry! Image not available at this time

Five-year-old Fortinet FortiOS SSL VPN vulnerability actively exploited

securityaffairs.co - 25/12/2025 19:40

Fortinet reported active exploitation of a five-year-old FortiOS SSL VPN flaw, abused in the wild under specific configurations. Fortinet researchers...

Sorry! Image not available at this time

Five-year-old Fortinet FortiOS SSL VPN vulnerability actively exploited

securityaffairs.co - 25/12/2025 19:40

Fortinet reported active exploitation of a five-year-old FortiOS SSL VPN flaw, abused in the wild under specific configurations. Fortinet researchers...

Sorry! Image not available at this time

White-tailed deer use UV-glowing urine and trees to signal mates, scientists find

wn.com - 26/12/2025 14:33

White-tailed deer use glowing signposts to communicate during mating season, a new study has revealed. The University of Georgia, US, found that...

Sorry! Image not available at this time

White-tailed deer use UV-glowing urine and trees to signal mates, scientists find

wn.com - 26/12/2025 14:33

White-tailed deer use glowing signposts to communicate during mating season, a new study has revealed. The University of Georgia, US, found that...

Sorry! Image not available at this time

VVS Stealer Uses PyArmor Obfuscation to Evade Static Analysis and Signature Detection

itsecuritynews.info - 03/Jan 10:32

The cybersecurity landscape is witnessing a rise in sophisticated malware that leverages legitimate tools to mask malicious intent. A prime example is...

Sorry! Image not available at this time

Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families

itsecuritynews.info - 18:11

A sophisticated Windows packer known as pkr_mtsi has emerged as a powerful tool for delivering multiple malware families through widespread...

Sorry! Image not available at this time

Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families

itsecuritynews.info - 18:11

A sophisticated Windows packer known as pkr_mtsi has emerged as a powerful tool for delivering multiple malware families through widespread...

Sorry! Image not available at this time

Advanced Rootkit Used to Conceal ToneShell Malware in Targeted Cyberespionage Attacks

itsecuritynews.info - 31/12/2025 18:31

  Cybersecurity researchers have brought to light a new wave of cyberespionage activity in which government networks across parts of Asia were...

Sorry! Image not available at this time

Advanced Rootkit Used to Conceal ToneShell Malware in Targeted Cyberespionage Attacks

itsecuritynews.info - 31/12/2025 18:31

  Cybersecurity researchers have brought to light a new wave of cyberespionage activity in which government networks across parts of Asia were...

Sorry! Image not available at this time

Sanaa negotiating team member comments on Riyadh hosting Southern dialogue

en.ypagency.net - 05/Jan 20:51

SANAA, Jan. 05 (YPA) – Abdulmalik Alejri, a member of the Sanaa negotiating delegation, commented on Riyadh’s move to host a so-called...