X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 16/Oct 15:01

Operation Zero Disco: Cisco SNMP Vulnerability Exploited

A new and highly sophisticated cyberattack campaign, dubbed Operation Zero Disco by Trend Micro researchers, is actively exploiting a critical vulnerability in Cisco network devices to install stealthy Linux rootkits.…

Articles similaires

Sorry! Image not available at this time

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

itsecuritynews.info - 06:06

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities...

Sorry! Image not available at this time

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

itsecuritynews.info - 06:06

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities...

Sorry! Image not available at this time

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials

itsecuritynews.info - 22/Oct 16:04

A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May 2025,...

Sorry! Image not available at this time

CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability

itsecuritynews.info - 30/Oct 05:33

In a critical update issued on October 29, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) has provided organizations with enhanced...

Sorry! Image not available at this time

CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability

itsecuritynews.info - 30/Oct 05:33

In a critical update issued on October 29, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) has provided organizations with enhanced...

Sorry! Image not available at this time

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

itsecuritynews.info - 24/Oct 19:06

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a...

Sorry! Image not available at this time

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

itsecuritynews.info - 23/Oct 16:06

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully...

Sorry! Image not available at this time

Hackers exploiting critical "SessionReaper" flaw in Adobe Magento

bleepingcomputer.com - 22/Oct 18:41

Hackers are actively exploiting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce (formerly Magento) platforms, with...

Sorry! Image not available at this time

CISA Beware! Hackers Are Actively Exploiting Windows Server Update Services RCE Flaw in the Wild

itsecuritynews.info - 25/Oct 17:05

Cybersecurity researchers are sounding the alarm after discovering that hackers are actively exploiting a critical remote code execution (RCE)...

Sorry! Image not available at this time

PolarEdge Botnet Hits 25K IoT Devices in Major Cyber Campaign

itsecuritynews.info - 30/Oct 05:33

Cybersecurity researchers at XLab have uncovered a sophisticated infrastructure-as-a-service botnet operation called PolarEdge, which has compromised...