X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - Hier 17:09

Termite Ransomware — Threat Intelligence and Technical Dissection

1. Executive Summary Termite is a highly sophisticated ransomware operation first observed in November 2024. Built on the leaked Babuk ransomware source code, Termite has evolved rapidly from opportunistic CVE…

Articles similaires

Crucible Of Nations: Middle East At Inflection Point, War, Realignment, And Chimera Of Peace – Analysis

eurasiareview.com - 08/Mar 23:55

1. The Architecture of Cascading Conflict The violence that erupted from Gaza on 7 October 2023 was not simply a bilateral Israeli-Palestinian...

Sorry! Image not available at this time

CISSP Executive Briefing: AI-Driven Threat Landscape Evolution

thecyberthrone.in - 07/Mar 14:07

When Attackers Scale Intelligence Faster Than Defenders Scale Controls Executive Summary Artificial Intelligence is not just transforming business...

Sorry! Image not available at this time

Thousands of iPhones Compromised in Massive Hack via Coruna Exploit Kit with 23 Vulnerabilities

itsecuritynews.info - 04/Mar 05:32

Security researchers from the Google Threat Intelligence Group (GTIG) have uncovered “Coruna,” a highly sophisticated iOS exploit kit responsible...

Sorry! Image not available at this time

Thousands of iPhones Compromised in Massive Hack via Coruna Exploit Kit with 23 Vulnerabilities

itsecuritynews.info - 04/Mar 05:32

Security researchers from the Google Threat Intelligence Group (GTIG) have uncovered “Coruna,” a highly sophisticated iOS exploit kit responsible...

Sorry! Image not available at this time

Termite ransomware breaches linked to ClickFix CastleRAT attacks

bleepingcomputer.com - 07/Mar 16:14

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware...

Sorry! Image not available at this time

Termite ransomware breaches linked to ClickFix CastleRAT attacks

bleepingcomputer.com - 07/Mar 16:14

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware...

Sorry! Image not available at this time

LeakBase cybercrime forum with 142,000 users taken down in global operation

itsecuritynews.info - 05/Mar 09:07

LeakBase, an open-web cybercrime forum facilitating the trade of leaked databases and “stealer logs” containing stolen credentials, has been taken...

Sorry! Image not available at this time

LeakBase cybercrime forum with 142,000 users taken down in global operation

itsecuritynews.info - 05/Mar 09:07

LeakBase, an open-web cybercrime forum facilitating the trade of leaked databases and “stealer logs” containing stolen credentials, has been taken...

Booking.com Email spoofing scam: How fraudsters used a clone website and WhatsApp to steal £500 from an apartment owner

asaaseradi.com - 23/Feb 16:28

Inside the Booking.com Spoofing Scam: A Coordinated Digital Deception A short-term rental property owner has lost £500 in what cybersecurity analysts...

Booking.com Email spoofing scam: How fraudsters used a clone website and WhatsApp to steal £500 from an apartment owner

asaaseradi.com - 23/Feb 16:28

Inside the Booking.com Spoofing Scam: A Coordinated Digital Deception A short-term rental property owner has lost £500 in what cybersecurity analysts...