X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 11/Jan 14:13

Fake PoC Exploit Targets Cybersecurity Researchers with Malware

A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft’s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks. This article has been indexed from…

Articles similaires

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Crooks target DeepSeek users with fake sponsored Google ads to deliver malware

securityaffairs.co - 27/Mar 14:37

Cybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in...

Sorry! Image not available at this time

5 Unexpected Devices You Didn’t Know Could Spread Malware

itsecuritynews.info - 24/Mar 20:32

When you think of malware, your mind probably jumps to malicious downloads or email attachments. But it turns… This article has been indexed from...

Sorry! Image not available at this time

New npm Malware Attack Infects Popular Ethereum Library with Backdoor

itsecuritynews.info - 26/Mar 18:12

Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new… This article has been...

Sorry! Image not available at this time

New npm Malware Attack Infects Popular Ethereum Library with Backdoor

itsecuritynews.info - 26/Mar 18:12

Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new… This article has been...

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...

Sorry! Image not available at this time

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

itsecuritynews.info - 26/Mar 06:11

Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783. This vulnerability has been...

Sorry! Image not available at this time

CVE-2025-56325 impacts Apache Pinot

thecyberthrone.in - 28/Mar 10:58

CVE-2025-56325 is a critical vulnerability affecting Apache Pinot, a real-time distributed OLAP datastore designed for low-latency analytics. This...