X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 31/12/2024 18:54

New details reveal how hackers hijacked 35 Google Chrome extensions

New details have emerged about a phishing campaign targeting Chrome browser extension developers that led to the compromise of at least thirty-five extensions to inject data-stealing code, including those from cybersecurity firm Cyberhaven. [...]

Articles similaires

Sorry! Image not available at this time

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices

itsecuritynews.info - 13/Oct 18:02

The cybersecurity landscape witnessed a concerning development as threat actors discovered a novel attack vector targeting Microsoft Edge’s Internet...

Sorry! Image not available at this time

Hackers Leveraging Microsoft Edge Internet Explorer Mode to Gain Access to Users’ Devices

itsecuritynews.info - 13/Oct 18:02

The cybersecurity landscape witnessed a concerning development as threat actors discovered a novel attack vector targeting Microsoft Edge’s Internet...

Sorry! Image not available at this time

Malicious crypto-stealing VSCode extensions resurface on OpenVSX

bleepingcomputer.com - 21:35

A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode) marketplace...

Sorry! Image not available at this time

Malicious crypto-stealing VSCode extensions resurface on OpenVSX

bleepingcomputer.com - 21:35

A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode) marketplace...

Sorry! Image not available at this time

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

itsecuritynews.info - 01/Oct 11:33

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in...

Sorry! Image not available at this time

Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently

itsecuritynews.info - 08/Oct 10:02

WordPress websites have become a prime target for threat actors seeking to monetize traffic and compromise visitor security. In recent months, a new...

Sorry! Image not available at this time

Malicious ZIP Files Use Windows Shortcuts to Drop Malware

itsecuritynews.info - 02/Oct 10:32

Cybersecurity firm Blackpoint Cyber reveals a new spear phishing campaign targeting executives. Learn how attackers use fraudulent document ZIPs...

Sorry! Image not available at this time

Hackers Can Inject Malicious Code into Antivirus Processes to Create a Backdoor

itsecuritynews.info - 11/Oct 18:32

A new technique enables attackers to exploit antivirus software by injecting harmful code directly into the antivirus processes. This approach makes...

Sorry! Image not available at this time

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware

itsecuritynews.info - 13:02

A novel phishing campaign has emerged targeting Colombian users by abusing judicial notifications and weaponizing Scalable Vector Graphics (SVG)...

Sorry! Image not available at this time

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware

itsecuritynews.info - 13:02

A novel phishing campaign has emerged targeting Colombian users by abusing judicial notifications and weaponizing Scalable Vector Graphics (SVG)...