X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 17/Feb 07:07

Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

The Microsoft Threat Intelligence Center (MSTIC) has uncovered an ongoing and sophisticated phishing campaign leveraging Microsoft Teams invites to gain unauthorized access to user accounts and sensitive data. The campaign, attributed to a threat actor known as Storm-2372, has been…

Articles similaires

Sorry! Image not available at this time

Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access

itsecuritynews.info - 17/Feb 07:06

In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372 has been leveraging Microsoft Teams meeting invites to execute...

Sorry! Image not available at this time

Storm-2372 used the device code phishing technique since August 2024

itsecuritynews.info - 16/Feb 15:06

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries....

Sorry! Image not available at this time

Russian phishing campaigns exploit Signal's device-linking feature

bleepingcomputer.com - 11:59

Russian threat actors have been launching phishing campaigns that exploit the legitimate "Linked Devices" feature in the Signal messaging app to gain...

Sorry! Image not available at this time

Storm-2372 used the device code phishing technique since August 2024

securityaffairs.co - 16/Feb 14:29

Russia-linked group Storm-2372 used the device code phishing technique since Aug 2024 to steal login tokens from governments, NGOs, and industries....

Sorry! Image not available at this time

Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens

itsecuritynews.info - 14/Feb 09:09

A sophisticated phishing campaign leveraging the device code authentication flow has been identified by Microsoft Threat Intelligence, targeting a...

Sorry! Image not available at this time

Microsoft: Hackers steal emails in device code phishing attacks

bleepingcomputer.com - 15/Feb 15:22

An active campaign from a threat actor potentially linked to Russia is targeting Microsoft 365 accounts of individuals at organizations of...

Sorry! Image not available at this time

North Korean Hackers Use Custom-Made RDP Wrapper To Activate Remote Desktop on Hacked Machines

itsecuritynews.info - 06/Feb 09:09

Cybersecurity experts have uncovered a sophisticated campaign by North Korea’s Kimsuky group, employing a custom-built RDP Wrapper to gain...

Sorry! Image not available at this time

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

itsecuritynews.info - 13/Feb 13:05

Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including technology, manufacturing,...

Sorry! Image not available at this time

Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware

itsecuritynews.info - 18:04

A sophisticated cyber espionage campaign linked to Chinese state-aligned threat actors has targeted organizations across 15 countries using an updated...

Sorry! Image not available at this time

Hackers Newly Registering Valentine’s Day Themed Domains for Stealthy Cyber Attacks

itsecuritynews.info - 11/Feb 17:09

Researchers have identified a surge in newly registered Valentine’s Day-themed domains, with threat actors leveraging terms like “love,”...