X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 16/Jan 10:59

MikroTik botnet relies on DNS misconfiguration to spread malware

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]

Articles similaires

Sorry! Image not available at this time

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

itsecuritynews.info - 25/Mar 19:32

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures...

Sorry! Image not available at this time

Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users

itsecuritynews.info - 26/Mar 17:38

A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack campaign targeting Indian users...

Sorry! Image not available at this time

Pakistan APT Hackers Weaponize malicious IndiaPost Site to Target Windows and Android Users

itsecuritynews.info - 26/Mar 17:38

A Pakistan-based Advanced Persistent Threat (APT) group, likely APT36, has launched a multi-platform cyberattack campaign targeting Indian users...

Sorry! Image not available at this time

Crooks target DeepSeek users with fake sponsored Google ads to deliver malware

securityaffairs.co - 27/Mar 14:37

Cybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in...

Sorry! Image not available at this time

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion

bleepingcomputer.com - 28/Mar 16:33

A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH)...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

itsecuritynews.info - 26/Mar 06:11

Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783. This vulnerability has been...

Sorry! Image not available at this time

IT Security News Hourly Summary 2025-03-25 21h : 9 posts

itsecuritynews.info - 25/Mar 20:05

9 posts were published in the last hour 19:32 : Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52% 19:32 : Cybercriminals...

Sorry! Image not available at this time

Google Chrome was affected by CVE-2025-2783

thecyberthrone.in - 27/Mar 03:24

CVE-2025-2783 is a zero-day vulnerability affecting Google Chrome, uncovered in a targeted cyber-espionage campaign known as Operation ForumTroll....