X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 31/Jan 16:32

Cybercriminals Exploit GitHub Infrastructure to Distribute Lumma Stealer

In a recent investigation, Trend Micro’s Managed XDR team identified a sophisticated malware campaign exploiting GitHub’s release infrastructure to distribute Lumma Stealer, along with SectopRAT, Vidar, and Cobeacon malware. This campaign underscores the evolving tactics of attackers leveraging trusted platforms…

Articles similaires

Sorry! Image not available at this time

Casio UK Web Store Hacked to Inject Customer Credit Card Stealing Scripts

itsecuritynews.info - 04/Feb 04:32

A sophisticated web-skimming campaign targeting multiple websites, including the UK online store of electronics giant Casio (casio[.]co.uk). The...

Sorry! Image not available at this time

Hackers Leveraging Image & Video Attachments to Deliver Malware

itsecuritynews.info - 13:32

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like steganography and social...

Sorry! Image not available at this time

Cybercriminals Exploit Cloud Services to Steal Login Information

itsecuritynews.info - 24/Jan 18:31

  You may think you are receiving an email from your trusted ProtonMail account — only to discover it’s a trap set by cybercriminals. Recent...

Sorry! Image not available at this time

The Evolving Role of Multi-Factor Authentication in Cybersecurity

itsecuritynews.info - 01/Feb 17:04

  < p style=”text-align: justify;”>In recent years, the cybersecurity landscape has faced an unprecedented wave of threats. State-sponsored...

Sorry! Image not available at this time

Hackers Hijack JFK File Release: Malware & Phishing Surge

itsecuritynews.info - 02/Feb 23:04

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files....

Sorry! Image not available at this time

FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations

itsecuritynews.info - 31/Jan 16:32

Discover how cybercriminals use ‘Infrastructure Laundering’ to exploit AWS and Azure for scams, phishing, and money laundering. Learn about...

Sorry! Image not available at this time

Cybercriminals Exploit PDFs in Novel Mishing Campaign

itsecuritynews.info - 02/Feb 16:03

  In a recently uncovered phishing campaign, threat actors are employing malicious PDF files to target mobile device users in potentially more than...

Sorry! Image not available at this time

J-magic malware campaign targets Juniper routers

securityaffairs.co - 24/Jan 19:35

Threat actors are targeting Juniper routers with a custom backdoor in a campaign called code-named “J-magic,” attackers are exploiting a...

Sorry! Image not available at this time

Threat Actors Exploit Government Websites for Phishing

itsecuritynews.info - 29/Jan 14:08

Cybercriminals exploit government websites using open redirects and phishing tactics, bypassing secure email gateway protections This article has been...

Sorry! Image not available at this time

Hamster Kombat’s 250 million players targeted in malware attacks – BleepingComputer

one2ninety.org - 25/Jan 21:09

Windows 11 24H2 now also offered to all eligible Windows 10 PCsHundreds of fake Reddit sites push Lumma Stealer malwareStealthy ‘Magic...