Skip to content

Cybersecurity News

  • Home
  • World Cyber News
  • TN CyberNews
  • Hacking
  • Cybersecurity
  • Technologies
  • Interviews
  • Events
  • Awarness
  • Pin Posts
  • Hacking

Nouvelle backdoor TeleBots : Première preuve liant Industroyer à NotPetya

Haythem Elmir 7 ans ago
Nouvelle backdoor TeleBots : Première preuve liant Industroyer à NotPetya

L’analyse par ESET d’une récente backdoor (ou porte dérobée) utilisée par TeleBots – le groupe à l’origine de l’épidémie massive de rançon de NotPetya – révèle de fortes similitudes de code avec la backdoor principale d’Industroyer, révélant une connexion rumeur qui n’avait pas été démontrée auparavant. rmi les incidents de […]

0 1
Share
  • Cybersecurity

How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

Haythem Elmir 7 ans ago
How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

  martphones have become synonymous with everyday business operations, enabling employees to store important contact details, browse the web and reply to emails while on the move. However, the ubiquity of such devices has led scammers to increasingly target them with a variety of phishing attacks – all designed to […]

0 1
Share
  • Hacking

New Backdoor Ties NotPetya and Industroyer to TeleBots Group

Haythem Elmir 7 ans ago
New Backdoor Ties NotPetya and Industroyer to TeleBots Group

  Security researchers found the missing link that helps them prove that the NotPetya disk-wiping malware and the Industroyer backdoor for electric power systems are the work of the TeleBots group. Both pieces of malware were used in attacks against targets in Ukraine and researchers have found clues in the past pointing to the […]

0 1
Share
  • Hacking

Innovative Phishing Tactic Makes Inroads Using Azure Blob

Haythem Elmir 7 ans ago
Innovative Phishing Tactic Makes Inroads Using Azure Blob

A brand-new approach to harvesting credentials hinges on users’ lack of cloud savvy. A fresh tactic for phishing Office 365 users employs credential-harvesting forms hosted on Azure Blob storage – signed with legitimate Microsoft SSL certificates to lend an air of legitimacy. Azure Blob Storage is a cloud storage solution […]

0 1
Share
  • Hacking
  • World Cyber News

Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites

Haythem Elmir 7 ans ago
Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites

After 5 years Italian police identified the hacker who is behind the NASA Websites hack and sixty institutional sites of local authorities. The Hackers almost defaced around 70 websites that belong to Italian and foreign institutional sites along with American spy agencies and 8 NSA owned domainsback in 2013. A 23-year-old […]

0 1
Share
  • Hacking

New Gallmaker APT group eschews malware in cyber espionage campaigns

Haythem Elmir 7 ans ago
New Gallmaker APT group eschews malware in cyber espionage campaigns

A previously unknown cyber espionage group, tracked as Gallmaker, has been targeting entities in the government, military and defense sectors since at least 2017. A new cyber espionage group tracked as Gallmaker appeared in the threat landscape. According to researchers from Symantec, who first spotted the threat actor, the group has launched […]

0 1
Share
  • Hacking

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Haythem Elmir 7 ans ago
Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature

Millions of Xiongmai video surveillance devices can be easily hacked via cloud feature, a gift for APT groups and cyber crime syndicates Security experts from security firm SEC Consult have identified over 100 companies that buy and re-brand video surveillance equipment (surveillance cameras, digital video recorders (DVRs), and network video recorders […]

0 1
Share
  • World Cyber News

Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Haythem Elmir 7 ans ago
Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks

Security firm Group-IB has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of damage to Russia’s financial sector Group-IB, an international company that specializes in preventing cyber attacks, has estimated that in H2 2017-H1 2018 cyber attacks caused $49.4 million (2.96 billion rubles) of […]

0 1
Share
  • Hacking

Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

Haythem Elmir 7 ans ago
Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks

Security researchers at NetLab, a sub-division of the Chinese cybersecurity firm Qihoo 360, have discovered a new, wide-scale, and very active malware campaign that has managed to hijack more than 100,000 home routers between Sept 21 and 27. A majority of routers (almost 88%) are located in Brazil. The malware […]

0 1
Share
  • Hacking

Apple Releases Security Updates for iOS and iCloud, Fixes Passcode Bypass

Haythem Elmir 7 ans ago
Apple Releases Security Updates for iOS and iCloud, Fixes Passcode Bypass

Apple has released a new round of security updates for iOS 12 and iCloud that resolve numerous vulnerabilities. For iOS, these updates resolve two passcode bypasses and for iCloud there are numerous, including critical, vulnerabilities that were fixed. Included in this update are also fixes for the charging and WiFi bugs that […]

0 1
Share

Pagination des publications

Previous 1 … 34 35 36 37 38 39 40 41 42 … 193 Next
Cybersécurité en Tunisie. WordPress Theme: Seek by ThemeInWP