X

Vous n'êtes pas connecté

Maroc Maroc - IT-ONLINE.CO.ZA - A La Une - Hier 09:22

How phishing threats evolved in 2025

A new Kaspersky review reveals how cybercriminals revived and refined phishing techniques to target individuals and businesses in 2025, including calendar-based attacks, voice message deceptions and sophisticated multi-factor authentication (MFA) bypass schemes. The findings emphasise the critical need for user vigilance, employee training and advanced email protection solutions to counter these persistent threats moving forward. […]

Articles similaires

Sorry! Image not available at this time

Mandiant details how ShinyHunters abuse SSO to steal cloud data

bleepingcomputer.com - 31/Jan 15:02

Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded...

Sorry! Image not available at this time

Mandiant details how ShinyHunters abuse SSO to steal cloud data

bleepingcomputer.com - 31/Jan 15:02

Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded...

Sorry! Image not available at this time

New Telegram Phishing Attack Abuses Authentication Workflows to Obtain Full Authorized User Sessions

itsecuritynews.info - 08:16

A sophisticated Telegram phishing campaign has re-emerged, marking a significant evolution in how threat actors compromise user accounts. Unlike...

Sorry! Image not available at this time

ScarCruft Exploits Trusted Cloud Services and OLE Documents to Deliver Malware

itsecuritynews.info - 12:23

The North Korean-backed advanced persistent threat (APT) group known as ScarCruft has significantly evolved its attack techniques. In a departure from...

Sorry! Image not available at this time

ShinyHunters flip the script on MFA in new data theft attacks

itsecuritynews.info - 02/Feb 16:34

Multi-factor authentication (MFA) is supposed to defend against phishing attacks, but threat actors operating under the ShinyHunters banner are using...

Sorry! Image not available at this time

When MFA Fails Quietly: Inside the Rise of AiTM Phishing Attacks

itsecuritynews.info - 28/Jan 20:11

Multi-factor authentication has long been treated as a security finish line. Once enabled, organizations assume that account takeover risks drop...

Sorry! Image not available at this time

When MFA Fails Quietly: Inside the Rise of AiTM Phishing Attacks

itsecuritynews.info - 28/Jan 20:11

Multi-factor authentication has long been treated as a security finish line. Once enabled, organizations assume that account takeover risks drop...

Sorry! Image not available at this time

Beware of Fake Dropbox Phishing Attack that Harvest Login Credentials

itsecuritynews.info - 03/Feb 19:34

Cybercriminals are launching a dangerous phishing campaign that tricks users into giving away their login credentials by impersonating Dropbox. This...

Sorry! Image not available at this time

Apple Pay Users Targeted by Phishing Attack Aimed at Stealing Payment Details

itsecuritynews.info - 07/Feb 12:39

A sophisticated new phishing campaign is targeting Apple Pay users, leveraging high-quality email design and social engineering to bypass security...

Sorry! Image not available at this time

Hackers Abuse Apple & PayPal Invoice Emails in DKIM Replay Attack Campaign

itsecuritynews.info - 13:41

A sophisticated way to bypass email security by weaponizing legitimate messages from trusted companies like Apple and PayPal. These attacks, known as...