X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 18/Jun 15:06

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting Earlier this month our expert takedown team responded to a bad actor that used link shortener services to obfuscate a link to a phishing page that impersonated one…

Articles similaires

Sorry! Image not available at this time

Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769

securityaffairs.co - 01/Jul 07:14

Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers. Researchers from...

Sorry! Image not available at this time

UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs

bleepingcomputer.com - 20/Jun 17:46

A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on...

Sorry! Image not available at this time

Military-themed Email Scam Spreads Malware to Infect Pakistani Users

itsecuritynews.info - 21/Jun 14:08

Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor....

Sorry! Image not available at this time

Ethereum mailing list breach exposes 35,000 to crypto draining attack

bleepingcomputer.com - 16:17

A threat actor compromised Ethereum's mailing list provider and sent to over 35,000 addresses a phishing email with a link to a malicious site running...

Sorry! Image not available at this time

“Don’t Use Fame To Create Enemies For Yourself On Social Media” – Nosa Rex Warns

kanyidaily.com - 02/Jul 11:24

Nollywood actor, Nosa Rex has has warned people against using fame to create enemies on social media. In a post shared on his Instagram page, Nosa Rex...

Sorry! Image not available at this time

Threat Actor Claiming 2FA Bypass Vulnerability in HackerOne Bug Bounty Platform

itsecuritynews.info - 06:32

A threat actor has claimed to have discovered a vulnerability that bypasses the two-factor authentication (2FA) on the HackerOne bug bounty platform....

Sorry! Image not available at this time

Harvesting unused micro-vibration to generate electricity

techxplore.com - 25/Jun 13:23

Energy Harvesting is a green technology that captures (or "harvests") wasted energy and converts it into electricity. The ubiquitous vibrations that...

Sorry! Image not available at this time

Hubspot says it’s investigating customer account hacks

itsecuritynews.info - 28/Jun 18:32

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...

Sorry! Image not available at this time

HubSpot says it’s investigating customer account hacks

itsecuritynews.info - 28/Jun 19:06

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...

Sorry! Image not available at this time

Skeleton Key the Latest Jailbreak Threat to AI Models: Microsoft

itsecuritynews.info - 28/Jun 17:09

Microsoft details Skeleton Key, a new jailbreak technique in which a threat actor can convince an AI model to ignore its built-in safeguards and...