X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 16/Jan 10:11

Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service

Introduction In December 2024, during our daily threat hunting routine, we uncovered a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts. These phishing pages have been circulating since at least October 2024, and during that period, we identified potential…

Articles similaires

Sorry! Image not available at this time

KnowBe4 Report Highlights Latest Phishing Threats

australiancybersecuritymagazine.com.au - 21/Mar 02:41

Cybersecurity company KnowBe4 had released its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights...

Sorry! Image not available at this time

Fake Semrush ads used to steal SEO professionals’ Google accounts

bleepingcomputer.com - 21/Mar 17:16

A new phishing campaign is targeting SEO professionals with malicious Semrush Google Ads that aim to steal their Google account credentials. [...]

Sorry! Image not available at this time

Fake Semrush ads used to steal SEO professionals’ Google accounts

bleepingcomputer.com - 21/Mar 17:16

A new phishing campaign is targeting SEO professionals with malicious Semrush Google Ads that aim to steal their Google account credentials. [...]

Sorry! Image not available at this time

New Phishing Campaign Targets Mac Users to Steal Login Credentials

itsecuritynews.info - 25/Mar 19:07

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from Windows users to Mac users in response to enhanced...

Sorry! Image not available at this time

No New Teacher Deployment Policy – PSC

thezimbabwean.co.uk - 19/Mar 18:27

The Public Service Commission (PSC) has refuted a message circulating on social media claiming the introduction of a new deployment policy for...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

itsecuritynews.info - 28/Mar 17:32

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS...

Sorry! Image not available at this time

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks

bleepingcomputer.com - 24/Mar 14:01

Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data—demonstrating how built-in security isn't...

Sorry! Image not available at this time

Hidden Threats: How Microsoft 365 Backups Store Risks for Future Attacks

bleepingcomputer.com - 24/Mar 14:01

Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data—demonstrating how built-in security isn't...

Pardoned J6-er with history of far-right extremism now stands guard at Tesla dealerships

rawstory.com - 25/Mar 20:22

A self-identified Three Percenter who received a pardon from President Donald Trump for his role in the 2021 attack on the U.S. Capitol showed up over...