Skip to content

Cybersecurity News

  • Home
  • World Cyber News
  • TN CyberNews
  • Hacking
  • Cybersecurity
  • Technologies
  • Interviews
  • Events
  • Awarness
  • Pin Posts
  • Hacking

Les scripts de cryptojacking pourraient profiter d’une nouvelle fonctionnalité de Word

Haythem Elmir 8 ans ago
Les scripts de cryptojacking pourraient profiter d’une nouvelle fonctionnalité de Word

Le cryptojacking consiste à utiliser secrètement les ressources de votre dispositif pour miner de la cryptomonnaie. L’idée du cryptojacking est née en mi-septembre lorsque CoinHive a proposé un script pour le minage de cryptomonnaies (monero en l’occurrence). Parmi les sites Web qui l’ont adopté, figure The Pirate Bay, le site […]

0 1
Share
  • Hacking

Le programme d’installation de Skype vulnérable aux attaques par injection DLL ?

Haythem Elmir 8 ans ago
Le programme d’installation de Skype vulnérable aux attaques par injection DLL ?

Selon plusieurs sources, le programme d’installation de Skype serait vulnérable aux attaques par injection DLL. Même la toute dernière version 8 serait concernée. Le programme d’installation de Skype se comporte-t-il comme un cheval de Troie en permettant des attaques par injection DLL ? C’est en tout cas ce que semble […]

0 1
Share
  • Hacking
  • World Cyber News

North Korean Hacking Group APT37 Expands Targets

Haythem Elmir 8 ans ago
North Korean Hacking Group APT37 Expands Targets

A lesser known hacker group believed to be working on behalf of the North Korean government has been expanding the scope and sophistication of its campaigns, according to a report published on Tuesday by FireEye. The threat actor is tracked by FireEye as APT37 and Reaper, and by other security […]

0 1
Share
  • Hacking

Amazon AWS Servers Might Soon Be Held for Ransom, Similar to MongoDB

Haythem Elmir 8 ans ago
Amazon AWS Servers Might Soon Be Held for Ransom, Similar to MongoDB

Amazon AWS S3 cloud storage servers might soon fall victims to ransom attacks, similar to how hacker groups held tens of thousands of MongoDB databases for ransom throughout 2017. The statement, made today on social media by infosec expert Kevin Beaumont, is nothing short of a prophecy of things to come, an […]

0 1
Share
  • Hacking

Coldroot RAT Still Undetectable Despite Being Uploaded on GitHub Two Years Ago

Haythem Elmir 8 ans ago
Coldroot RAT Still Undetectable Despite Being Uploaded on GitHub Two Years Ago

Coldroot, a remote access trojan (RAT), is still undetectable by most antivirus engines, despite being uploaded and freely available on GitHub for almost two years. The RAT appears to have been created as a joke, « to Play with Mac users, » and « give Mac it’s rights in this [the RAT] field, » but has […]

0 1
Share
  • Hacking

Hackers Exploite Tegra Chipset Flaw to Run Linux OS on Nintendo Switch

Haythem Elmir 8 ans ago
Hackers Exploite Tegra Chipset Flaw to Run Linux OS on Nintendo Switch

The exploit is unpatched putting Nintendo Switch devices at risk. Usually, hackers compromise a gaming console to be able to play pirated versions or cracked copies of their favorite games, which has become quite difficult now, or they want to run the software of their choice. Perhaps this is the […]

0 1
Share
  • Hacking
  • World Cyber News

Tesla Internal Servers Infected with Cryptocurrency Miner

Haythem Elmir 8 ans ago
Tesla Internal Servers Infected with Cryptocurrency Miner

Hackers have breached Tesla cloud servers used by the company’s engineers and have installed malware that mines the cryptocurrency. The incident took place last year when hackers gained access to Tesla’s Kubernetes server, an open-source application used by large companies to manage API and server infrastructure deployed on cloud hosting providers. Hackers […]

0 1
Share
  • Hacking

LockCrypt .1BTC Variant Installed Over Hacked Remote Desktop Services

Haythem Elmir 8 ans ago
LockCrypt .1BTC Variant Installed Over Hacked Remote Desktop Services

Today a reader sent me info regarding the LockCrypt Ransomware being actively distributed over hacked remote desktop services. This variant, when installed, will encrypt a victim’s files and then append the .1btc extension to encrypted file names. For those not familiar with the LockCrypt Ransomware, AlienVault has a good writeup about an older […]

0 1
Share
  • Hacking

Triton, le nouveau malware qui s’est rapidement fait connaître

Haythem Elmir 8 ans ago
Triton, le nouveau malware qui s’est rapidement fait connaître

Dans le monde de la cybercriminalité, les attaques se font de plus en plus nombreuses et exceptionnellement impressionnantes. C’est dans cette nouvelle vision des malwares que Triton a vu le jour au mois d’août 2017 et s’est fait remarqué en causant des perturbations opérationnelles importantes dans l’infrastructure d’une gigantesque usine. […]

0 1
Share
  • Hacking

A new multi-stage attack deploys a password stealer without using macros

Haythem Elmir 8 ans ago
A new multi-stage attack deploys a password stealer without using macros

Security researchers at Trustwave spotted a new malicious campaign that uses a multi-stage attack to deploy a password stealer. Researchers at Trustwave have spotted a new malware-based campaign that uses a multi-stage infection to deploy a password stealer malware. Hackers leverage the infamous Necurs botnet to distribute spam emails delivering Microsoft Office documents […]

0 1
Share

Pagination des publications

Previous 1 … 117 118 119 120 121 122 123 124 125 … 191 Next
Cybersécurité en Tunisie. WordPress Theme: Seek by ThemeInWP