X

Vous n'êtes pas connecté

Headings :

  - ITSECURITYNEWS.INFO - A La Une - 28/Jun 08:34

GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool. “Recent campaigns in June 2025 demonstrate GIFTEDCROOK’s enhanced ability to exfiltrate a broad…

Articles similaires

Sorry! Image not available at this time

GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

itsecuritynews.info - 28/Jun 08:34

The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a...

Sorry! Image not available at this time

Threat Actors Transform GIFTEDCROOK Stealer into an Intelligence-Gathering Tool

itsecuritynews.info - 28/Jun 23:03

The Arctic Wolf Labs team has uncovered a dramatic transformation in the capabilities of the GIFTEDCROOK infostealer, wielded by the threat group...

Sorry! Image not available at this time

Threat Actors Transform GIFTEDCROOK Stealer into an Intelligence-Gathering Tool

itsecuritynews.info - 28/Jun 23:03

The Arctic Wolf Labs team has uncovered a dramatic transformation in the capabilities of the GIFTEDCROOK infostealer, wielded by the threat group...

Sorry! Image not available at this time

Threat Actors Poison Search Results & Exploits Popularity of ChatGPT and Luma AI to Deliver Malicious Payloads

itsecuritynews.info - 25/Jun 12:32

Cybercriminals are increasingly exploiting the widespread fascination with artificial intelligence tools, leveraging the popularity of platforms like...

Sorry! Image not available at this time

Threat Actors Poison Search Results & Exploits Popularity of ChatGPT and Luma AI to Deliver Malicious Payloads

itsecuritynews.info - 25/Jun 12:32

Cybercriminals are increasingly exploiting the widespread fascination with artificial intelligence tools, leveraging the popularity of platforms like...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames

itsecuritynews.info - 26/Jun 11:03

IBM X-Force researchers have uncovered a series of targeted cyberattacks orchestrated by the China-aligned threat actor Hive0154. Throughout 2025,...

Sorry! Image not available at this time

Hackers turn ScreenConnect into malware using Authenticode stuffing

bleepingcomputer.com - 25/Jun 21:51

Threat actors are abusing the ConnectWise ScreenConnect installer to build signed remote access malware by modifying hidden settings within the...

Sorry! Image not available at this time

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

itsecuritynews.info - 02/Jul 07:04

Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that...