X

Vous n'êtes pas connecté

Maroc Maroc - SECURITYAFFAIRS.CO - A La Une - 16/01/2025 10:59

MikroTik botnet relies on DNS misconfiguration to spread malware

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about […]

Articles similaires

Sorry! Image not available at this time

Phishing campaign exploits OAuth redirection to bypass defenses

securityaffairs.co - 03/Mar 11:50

Microsoft researchers warn that threat actors abuse OAuth redirects to target government users and deliver malware. Microsoft has warned of phishing...

Sorry! Image not available at this time

Phishing Schemes Abuse .arpa TLD and IPv6 Tunnels to Evade Detection

itsecuritynews.info - 28/Feb 16:07

Cybersecurity researchers at Infoblox Threat Intel have uncovered a highly sophisticated phishing campaign that exploits the foundational plumbing of...

Sorry! Image not available at this time

Phishing Schemes Abuse .arpa TLD and IPv6 Tunnels to Evade Detection

itsecuritynews.info - 28/Feb 16:07

Cybersecurity researchers at Infoblox Threat Intel have uncovered a highly sophisticated phishing campaign that exploits the foundational plumbing of...

Sorry! Image not available at this time

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

bleepingcomputer.com - 15:01

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious...

Sorry! Image not available at this time

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

bleepingcomputer.com - 15:01

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious...

Sorry! Image not available at this time

Microsoft: Hackers abuse OAuth error flows to spread malware

bleepingcomputer.com - 03/Mar 20:59

Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages....

Sorry! Image not available at this time

Microsoft: Hackers abuse OAuth error flows to spread malware

bleepingcomputer.com - 03/Mar 20:59

Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages....

Sorry! Image not available at this time

CISA Warns of RESURGE Malware Exploiting 0-Days to Breach Ivanti Connect Secure Devices

itsecuritynews.info - 02/Mar 12:16

A newly discovered malware variant named RESURGE is actively targeting Ivanti Connect Secure devices by exploiting a critical zero-day vulnerability,...

Sorry! Image not available at this time

CISA Warns of RESURGE Malware Exploiting 0-Days to Breach Ivanti Connect Secure Devices

itsecuritynews.info - 02/Mar 12:16

A newly discovered malware variant named RESURGE is actively targeting Ivanti Connect Secure devices by exploiting a critical zero-day vulnerability,...

Sorry! Image not available at this time

Aeternum botnet hides commands in Polygon smart contracts

securityaffairs.co - 27/Feb 20:19

Aeternum botnet uses Polygon blockchain smart contracts for C&C, making its infrastructure harder to detect and disrupt. Qrator Labs researchers...