X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 20/Jun 08:34

How I Hacked Zoom? The Session Takeover Exploit Chain Analysis

This article explores a recently discovered exploit chain that allows attackers to take over Zoom sessions. The exploit… The post How I Hacked Zoom? The Session Takeover Exploit Chain Analysis appeared first on Hackers Online Club. This article has been…

Articles similaires

Sorry! Image not available at this time

Hackers Target Vulnerability Found Recently in Long-Discontinued D-Link Routers

itsecuritynews.info - 01/Jul 12:32

GreyNoise observes the first attempts to exploit a path traversal vulnerability in discontinued D-Link DIR-859 WiFi routers. The post Hackers Target...

Sorry! Image not available at this time

Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks

itsecuritynews.info - 19/Jun 14:06

National passenger railroad company Amtrak is notifying customers that hackers have breached their Guest Rewards Accounts. The post Amtrak Says Guest...

Sorry! Image not available at this time

Critical GitLab Bug Lets Attackers Run Pipelines as Any User

itsecuritynews.info - 29/Jun 06:06

A critical vulnerability has been discovered in certain versions of GitLab Community and Enterprise Edition products. This vulnerability allows an...

Sorry! Image not available at this time

How Hacked YouTube Channels Spread Scams and Malware

itsecuritynews.info - 02/Jul 13:09

The most common attack methods against YouTube channels involve phishing attacks to steal login credentials, exploiting weak or reused passwords, and...

Sorry! Image not available at this time

UK Health Club Chain ‘Total Fitness’ Data Leak Exposes KYC and Card Data

itsecuritynews.info - 20/Jun 18:09

UK-based health and fitness chain Total Fitness suffered a significant data breach leaving member photos, names, and even bank details vulnerable...

Sorry! Image not available at this time

Synnovis Attackers Publish NHS Patient Data Online

itsecuritynews.info - 21/Jun 10:08

Ransomware group Qilin has reportedly published nearly 400GB of data stolen following the attack on NHS provider Synnovis in early June This article...

Sorry! Image not available at this time

Authentication Bypasses in MOVEit Transfer and MOVEit Gateway

itsecuritynews.info - 26/Jun 08:32

A critical security vulnerability, CVE-2024-5806, has been found in MOVEit Transfer, a popular file transfer software. The vulnerability allows...

Sorry! Image not available at this time

Vulnerabilities in CocoaPods: The Achilles’ Heel of the Apple App Ecosystem

itsecuritynews.info - 15:05

Recent discoveries have unveiled severe vulnerabilities within CocoaPods, a dependency manager essential for iOS and macOS application development....

Sorry! Image not available at this time

SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques

itsecuritynews.info - 21/Jun 12:16

Cisco Talos recently discovered an ongoing campaign from SneakyChef, a newly discovered threat actor using SugarGh0st malware, as early as August...

Sorry! Image not available at this time

Intermediate vs Root Certificates

itsecuritynews.info - 25/Jun 07:08

PKI ensures secure digital communication by verifying online entities. Root and intermediate certificates create a trust chain, ensuring information...