X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 18/Jun 15:06

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting

Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting Earlier this month our expert takedown team responded to a bad actor that used link shortener services to obfuscate a link to a phishing page that impersonated one…

Articles similaires

Sorry! Image not available at this time

Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769

securityaffairs.co - 01/Jul 07:14

Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers. Researchers from...

Sorry! Image not available at this time

Airtel India denies 370 million user data breach

itsecuritynews.info - 05/Jul 16:07

Airtel, also known as Bharti Airtel, has denied reports of a data breach following speculation from various media outlets. The telecom giant stated...

Sorry! Image not available at this time

Ethereum mailing list breach exposes 35,000 to crypto draining attack

bleepingcomputer.com - 04/Jul 16:17

A threat actor compromised Ethereum's mailing list provider and sent to over 35,000 addresses a phishing email with a link to a malicious site running...

Sorry! Image not available at this time

“Don’t Use Fame To Create Enemies For Yourself On Social Media” – Nosa Rex Warns

kanyidaily.com - 02/Jul 11:24

Nollywood actor, Nosa Rex has has warned people against using fame to create enemies on social media. In a post shared on his Instagram page, Nosa Rex...

Sorry! Image not available at this time

Threat Actor Claiming 2FA Bypass Vulnerability in HackerOne Bug Bounty Platform

itsecuritynews.info - 05/Jul 06:32

A threat actor has claimed to have discovered a vulnerability that bypasses the two-factor authentication (2FA) on the HackerOne bug bounty platform....

Sorry! Image not available at this time

Harvesting unused micro-vibration to generate electricity

techxplore.com - 25/Jun 13:23

Energy Harvesting is a green technology that captures (or "harvests") wasted energy and converts it into electricity. The ubiquitous vibrations that...

Sorry! Image not available at this time

Hubspot says it’s investigating customer account hacks

itsecuritynews.info - 28/Jun 18:32

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...

Sorry! Image not available at this time

HubSpot says it’s investigating customer account hacks

itsecuritynews.info - 28/Jun 19:06

The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...

Sorry! Image not available at this time

Skeleton Key the Latest Jailbreak Threat to AI Models: Microsoft

itsecuritynews.info - 28/Jun 17:09

Microsoft details Skeleton Key, a new jailbreak technique in which a threat actor can convince an AI model to ignore its built-in safeguards and...

Sorry! Image not available at this time

GootLoader is still active and efficient

itsecuritynews.info - 06/Jul 20:06

Researchers warn that the malware GootLoader is still active and threat actors are still using it in their campaigns. Threat actors continue to use...