X

Vous n'êtes pas connecté

Rubriques :

  - ITSECURITYNEWS.INFO - A La Une - 11/Jan 14:13

Fake PoC Exploit Targets Cybersecurity Researchers with Malware

A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft’s Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks. This article has been indexed from…

Articles similaires

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials

itsecuritynews.info - 27/Jun 20:35

In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...

Sorry! Image not available at this time

Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines

itsecuritynews.info - 06:36

The notorious North Korean threat group Kimsuky has adopted a sophisticated social engineering tactic known as “ClickFix” to deceive users into...

Sorry! Image not available at this time

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

securityaffairs.co - 19/Jun 10:20

Java-based malware targets Minecraft users via fake cheat tools, utilizing the Stargazers Ghost Network distribution-as-a-service (DaaS). Check Point...

Sorry! Image not available at this time

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

securityaffairs.co - 19/Jun 10:20

Java-based malware targets Minecraft users via fake cheat tools, utilizing the Stargazers Ghost Network distribution-as-a-service (DaaS). Check Point...

Sorry! Image not available at this time

Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing

itsecuritynews.info - 25/Jun 12:33

A critical vulnerability in Realtek’s Bluetooth Low Energy (BLE) implementation enables attackers to launch denial-of-service (DoS) attacks during...

Sorry! Image not available at this time

Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing

itsecuritynews.info - 25/Jun 12:33

A critical vulnerability in Realtek’s Bluetooth Low Energy (BLE) implementation enables attackers to launch denial-of-service (DoS) attacks during...

Sorry! Image not available at this time

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos

itsecuritynews.info - 28/Jun 08:34

Cybercriminals use malicious AI models to write malware and phishing scams Cisco Talos warns of rising threats from uncensored and custom AI tools....

Sorry! Image not available at this time

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos

itsecuritynews.info - 28/Jun 08:34

Cybercriminals use malicious AI models to write malware and phishing scams Cisco Talos warns of rising threats from uncensored and custom AI tools....

Sorry! Image not available at this time

North Korean Hackers Weaponize GitHub Infrastructure to Distribute Malware

itsecuritynews.info - 23/Jun 14:37

Cybersecurity researchers have uncovered a sophisticated spearphishing campaign orchestrated by the North Korean threat group Kimsuky, leveraging...