X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 20/Jun 08:34

How I Hacked Zoom? The Session Takeover Exploit Chain Analysis

This article explores a recently discovered exploit chain that allows attackers to take over Zoom sessions. The exploit… The post How I Hacked Zoom? The Session Takeover Exploit Chain Analysis appeared first on Hackers Online Club. This article has been…

Articles similaires

Sorry! Image not available at this time

AI Development at Risk: Critical Vulnerability Discovered in Popular Python Library

itsecuritynews.info - 17/Jun 14:08

A major security flaw has been identified in a widely used Python library for artificial intelligence (AI) development,… The post AI Development at...

Sorry! Image not available at this time

Hackers Target Vulnerability Found Recently in Long-Discontinued D-Link Routers

itsecuritynews.info - 12:32

GreyNoise observes the first attempts to exploit a path traversal vulnerability in discontinued D-Link DIR-859 WiFi routers. The post Hackers Target...

Sorry! Image not available at this time

Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks

itsecuritynews.info - 19/Jun 14:06

National passenger railroad company Amtrak is notifying customers that hackers have breached their Guest Rewards Accounts. The post Amtrak Says Guest...

Sorry! Image not available at this time

Critical GitLab Bug Lets Attackers Run Pipelines as Any User

itsecuritynews.info - 29/Jun 06:06

A critical vulnerability has been discovered in certain versions of GitLab Community and Enterprise Edition products. This vulnerability allows an...

Sorry! Image not available at this time

UK Health Club Chain ‘Total Fitness’ Data Leak Exposes KYC and Card Data

itsecuritynews.info - 20/Jun 18:09

UK-based health and fitness chain Total Fitness suffered a significant data breach leaving member photos, names, and even bank details vulnerable...

Sorry! Image not available at this time

Synnovis Attackers Publish NHS Patient Data Online

itsecuritynews.info - 21/Jun 10:08

Ransomware group Qilin has reportedly published nearly 400GB of data stolen following the attack on NHS provider Synnovis in early June This article...

Sorry! Image not available at this time

Authentication Bypasses in MOVEit Transfer and MOVEit Gateway

itsecuritynews.info - 26/Jun 08:32

A critical security vulnerability, CVE-2024-5806, has been found in MOVEit Transfer, a popular file transfer software. The vulnerability allows...

Sorry! Image not available at this time

Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

itsecuritynews.info - 17/Jun 09:33

A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party...

Sorry! Image not available at this time

SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques

itsecuritynews.info - 21/Jun 12:16

Cisco Talos recently discovered an ongoing campaign from SneakyChef, a newly discovered threat actor using SugarGh0st malware, as early as August...

Sorry! Image not available at this time

Intermediate vs Root Certificates

itsecuritynews.info - 25/Jun 07:08

PKI ensures secure digital communication by verifying online entities. Root and intermediate certificates create a trust chain, ensuring information...