X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 08/Jul 09:07

Infostealing Malware Masquerading as Generative AI Tools

Information-stealing malware families have evolved to impersonate generative AI tools, with examples like GoldPickaxe stealing facial recognition data for deepfake videos. This article has been indexed from Cyware News – Latest Cyber News Read the original article: Infostealing Malware Masquerading…

Articles similaires

Sorry! Image not available at this time

Kanister Vulnerability Opens Door to Cluster-Level Privilege Escalation

itsecuritynews.info - 15:32

Exploiting this flaw, attackers can manipulate daemonsets, create service account tokens, and impersonate high-privilege accounts like cluster-admin....

Sorry! Image not available at this time

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

itsecuritynews.info - 07:32

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links...

Sorry! Image not available at this time

Unmasking the Overlap Between Golddigger and Gigabud Android Malware

itsecuritynews.info - 13/Aug 09:02

Initially discovered in January 2023 impersonating government entities, Gigabud and Golddigger malware campaigns have overlapped, suggesting the same...

Sorry! Image not available at this time

Fake WinRar Websites Distributing Malware Payloads Hosted on GitHub

itsecuritynews.info - 12/Aug 07:32

A fraudulent site resembling the official WinRar distribution platform is spreading malware. The fake website, win-rar[.]co, utilizes typosquatting to...

Sorry! Image not available at this time

Cybercriminal Duo Attracts FBI Notice by Spending Big & Living Large

itsecuritynews.info - 14/Aug 10:02

The FBI found that the cybercriminal duo was involved in Dark Web platforms like WWH Club, Skynetzone, and Opencard for buying, selling, and trading...

Sorry! Image not available at this time

Britain and France to Discuss Misuse of Commercial Cyber Intrusion Tools

itsecuritynews.info - 13/Aug 10:32

The UK and France will discuss the misuse of commercial cyber intrusion tools as part of the Pall Mall Process, aiming to address the irresponsible...

Sorry! Image not available at this time

NGate Android Malware Relays NFC Traffic to Steal Credit Card Data

itsecuritynews.info - 18:32

This malware allows attackers to emulate victims’ cards, enabling them to make unauthorized payments or withdraw cash from ATMs. The campaign has...

Sorry! Image not available at this time

New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise

itsecuritynews.info - 09:03

This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence...

Sorry! Image not available at this time

PG_MEM Malware Targets PostgreSQL Databases for Crypto Mining

itsecuritynews.info - 15:32

Cryptojacking attackers are targeting poorly secured PostgreSQL databases on Linux systems. According to Aqua Security researchers, the attack begins...

Sorry! Image not available at this time

DeathGrip: Emergence of a new Ransomware-as-a-Service

itsecuritynews.info - 14/Aug 09:03

Promoted through Telegram and other underground forums, DeathGrip RaaS offers aspiring threat actors on the dark web sophisticated ransomware tools,...