X

Vous n'êtes pas connecté

Rubriques :

  - ITSECURITYNEWS.INFO - A La Une - 25/Jun 12:32

Hackers Abuse ConnectWise to Hide Malware

G Data has observed a surge in malware infections originating from ConnectWise applications with modified certificate tables. The post Hackers Abuse ConnectWise to Hide Malware appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Articles similaires

Sorry! Image not available at this time

North Korean Hackers Try to Steal Crypto Via Deepfake Zoom Call

itsecuritynews.info - 25/Jun 01:05

A fake Zoom call featuring AI-generated executives tricked a crypto employee into downloading macOS malware linked to North Korea’s BlueNoroff...

Sorry! Image not available at this time

North Korean Hackers Try to Steal Crypto Via Deepfake Zoom Call

itsecuritynews.info - 25/Jun 01:05

A fake Zoom call featuring AI-generated executives tricked a crypto employee into downloading macOS malware linked to North Korea’s BlueNoroff...

Sorry! Image not available at this time

Microsoft 365 Direct Send Abused for Phishing

itsecuritynews.info - 08:07

Hackers are abusing the Microsoft 365 Direct Send feature to deliver phishing emails that bypass email security controls. The post Microsoft 365...

Sorry! Image not available at this time

ClickFix Attacks Surge 517% in 2025

itsecuritynews.info - 11:02

The ClickFix social engineering technique has become the second most common attack vector, behind only phishing, according to ESET research This...

Sorry! Image not available at this time

US insurance giant Aflac says customers’ personal data stolen during cyberattack

itsecuritynews.info - 23/Jun 15:05

The U.S. insurance giant provides supplemental insurance to around 50 million customers. This article has been indexed from Security News | TechCrunch...

Sorry! Image not available at this time

12 smart contract vulnerabilities and how to mitigate them

itsecuritynews.info - 20:05

Smart contracts execute tasks automatically when specific events occur, and they often handle large data and resource flows. This makes them...

Sorry! Image not available at this time

Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability

itsecuritynews.info - 09:42

The Citrix NetScaler vulnerability tracked as CitrixBleed 2 and CVE-2025–5777 may be exploited in the wild for initial access. The post Evidence...

Sorry! Image not available at this time

Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability

itsecuritynews.info - 09:42

The Citrix NetScaler vulnerability tracked as CitrixBleed 2 and CVE-2025–5777 may be exploited in the wild for initial access. The post Evidence...

Sorry! Image not available at this time

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

itsecuritynews.info - 24/Jun 13:36

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens...

Sorry! Image not available at this time

Siemens Notifies Customers of Microsoft Defender Antivirus Issue

itsecuritynews.info - 24/Jun 13:36

Siemens is working with Microsoft to address a Defender Antivirus problem that can lead to no malware alerts or plant disruptions. The post Siemens...