X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 11/Jan 14:13

Fake PoC Exploit Targets Cybersecurity Researchers with Malware

A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft’s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks. This article has been indexed from…

Articles similaires

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

itsecuritynews.info - 20/Mar 17:35

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly innocuous JPEG image files....

Sorry! Image not available at this time

CVE-2025-24071 POC Exploit released for Microsoft Flaw

thecyberthrone.in - 21/Mar 03:32

The CVE-2025-24071 vulnerability is a high security flaw identified in Windows File Explorer that allows attackers to steal NTLM hashed credentials...

Sorry! Image not available at this time

Crooks target DeepSeek users with fake sponsored Google ads to deliver malware

securityaffairs.co - 27/Mar 14:37

Cybercriminals are exploiting the popularity of DeepSeek by using fake sponsored Google ads to distribute malware. While DeepSeek is rising in...

Sorry! Image not available at this time

5 Unexpected Devices You Didn’t Know Could Spread Malware

itsecuritynews.info - 24/Mar 20:32

When you think of malware, your mind probably jumps to malicious downloads or email attachments. But it turns… This article has been indexed from...

Sorry! Image not available at this time

New npm Malware Attack Infects Popular Ethereum Library with Backdoor

itsecuritynews.info - 26/Mar 18:12

Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new… This article has been...

Sorry! Image not available at this time

New npm Malware Attack Infects Popular Ethereum Library with Backdoor

itsecuritynews.info - 26/Mar 18:12

Security researchers at ReversingLabs have discovered a new malware campaign on the npm package repository, revealing a new… This article has been...

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...