X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 14/Jan 15:01

ConsentFix debrief: Insights from the new OAuth phishing attack

ConsentFix is an OAuth phishing technique abusing browser-based authorization flows to hijack Microsoft accounts. Push Security shares new insights from continued tracking, community research, and evolving attacker techniques. [...]

Articles similaires

Sorry! Image not available at this time

ConsentFix debrief: Insights from the new OAuth phishing attack

bleepingcomputer.com - 14/Jan 15:01

ConsentFix is an OAuth phishing technique abusing browser-based authorization flows to hijack Microsoft accounts. Push Security shares new insights...

Sorry! Image not available at this time

Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025

itsecuritynews.info - 15/Jan 14:32

In Q4 2025, Microsoft once again ranked as the most impersonated brand in phishing attacks, accounting for 22% of all brand phishing attempts,...

Sorry! Image not available at this time

Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

itsecuritynews.info - 22/Jan 06:02

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations...

Sorry! Image not available at this time

Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint

itsecuritynews.info - 22/Jan 06:02

Microsoft Defender Researchers uncovered a multi‑stage AiTM phishing and business email compromise (BEC) campaign targeting multiple organizations...

Sorry! Image not available at this time

Browser-in-the-Browser phishing is on the rise: Here’s how to spot it

itsecuritynews.info - 13/Jan 12:31

Browser-in-the-Browser (BitB) phishing attacks are on the rise, with attackers reviving and refining the technique to bypass user skepticism and...

Sorry! Image not available at this time

Browser-in-the-Browser phishing is on the rise: Here’s how to spot it

itsecuritynews.info - 13/Jan 12:31

Browser-in-the-Browser (BitB) phishing attacks are on the rise, with attackers reviving and refining the technique to bypass user skepticism and...

Sorry! Image not available at this time

Reprompt attack let hackers hijack Microsoft Copilot sessions

bleepingcomputer.com - 14/Jan 14:00

Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue...

Sorry! Image not available at this time

Reprompt attack let hackers hijack Microsoft Copilot sessions

bleepingcomputer.com - 14/Jan 14:00

Researchers identified an attack method dubbed "Reprompt" that could allow attackers to infiltrate a user's Microsoft Copilot session and issue...

Building Africa’s Multigenerational Family Businesses: New Research from East Africa

africa.com - 13/Jan 16:23

Family businesses are the backbone of African economies, sustaining livelihoods, preserving heritage, and anchoring local communities across the...

Building Africa’s Multigenerational Family Businesses: New Research from East Africa

africa.com - 13/Jan 16:23

Family businesses are the backbone of African economies, sustaining livelihoods, preserving heritage, and anchoring local communities across the...