X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 14/01/2025 16:38

Codefinger Ransomware Dissection

The Codefinger ransomware campaign is a sophisticated and highly targeted attack aimed at users of Amazon Web Services (AWS). Unlike conventional ransomware attacks, Codefinger leverages AWS’s own encryption tools to lock victims out of their data, making recovery nearly impossible without paying the ransom. Here is a detailed breakdown of the attack methodology, impact, and […]

Articles similaires

Sorry! Image not available at this time

Termite Ransomware — Threat Intelligence and Technical Dissection

thecyberthrone.in - 09/Mar 17:09

1. Executive Summary Termite is a highly sophisticated ransomware operation first observed in November 2024. Built on the leaked Babuk ransomware...

Sorry! Image not available at this time

LeakNet Ransomware Dissection

thecyberthrone.in - 20/Mar 13:57

LeakNet is an emerging ransomware operator that entered the threat landscape in late 2024. Averaging about three victims per month, the group is now...

Sorry! Image not available at this time

LeakNet Ransomware Dissection

thecyberthrone.in - 20/Mar 13:57

LeakNet is an emerging ransomware operator that entered the threat landscape in late 2024. Averaging about three victims per month, the group is now...

Sorry! Image not available at this time

Ransomware is shifting targets – and many organisations are not prepared

it-online.co.za - 16/Mar 09:29

Ransomware attacks are evolving rapidly, moving beyond the simple encryption of files to target the systems organisations rely on to recover from an...

Sorry! Image not available at this time

UAE warn of cybersecurity risk of increased instances of Wiper Malware

techau.com.au - 14/Mar 09:55

Cyber security threats are traditionally categorized by their intent, with ransomware often taking the spotlight due to its financial motivations....

Sorry! Image not available at this time

Ransomware Attack Hits South Africa’s Land Bank, Hackers Demand Bitcoin Payment

itsecuritynews.info - 14:04

  South Africa’s Finance Minister Enoch Godongwana has disclosed that the Land and Agricultural Development Bank of South Africa was targeted in a...

Sorry! Image not available at this time

Ransomware Attack Hits South Africa’s Land Bank, Hackers Demand Bitcoin Payment

itsecuritynews.info - 14:04

  South Africa’s Finance Minister Enoch Godongwana has disclosed that the Land and Agricultural Development Bank of South Africa was targeted in a...

Sorry! Image not available at this time

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

itsecuritynews.info - 16/Mar 20:05

The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of...

Sorry! Image not available at this time

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

itsecuritynews.info - 16/Mar 20:05

The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of...

Sorry! Image not available at this time

Stablecoin: Moody’s methodology reveals risks, figures, and mechanisms behind the rating

cryptonomist.ch - 18/Mar 10:43

In recent years, stablecoins have become one of the most utilized tools in the crypto ecosystem, all the details.