X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 12/Aug 07:32

Fake WinRar Websites Distributing Malware Payloads Hosted on GitHub

A fraudulent site resembling the official WinRar distribution platform is spreading malware. The fake website, win-rar[.]co, utilizes typosquatting to trick users who mistype the URL. This article has been indexed from Cyware News – Latest Cyber News Read the original…

Articles similaires

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

New Stealthy Malware Campaign Dubbed DarkCracks Exploits GLPI and WordPress Sites

itsecuritynews.info - 07/Sep 07:32

DarkCracks isn’t your typical malware campaign—it’s a sophisticated Launcher designed for long-term exploitation. It deploys malicious payloads...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

itsecuritynews.info - 06/Sep 16:32

Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading booby-trapped...

Sorry! Image not available at this time

LummaC2 Infostealer Resurfaces with Obfuscated PowerShell Tactics

itsecuritynews.info - 30/Aug 10:02

The latest variant employs obfuscated PowerShell commands to download and execute malicious payloads, utilizing Windows binaries like Mshta.exe and...

Sorry! Image not available at this time

Rocinante: The Trojan Horse That Wanted to Fly

itsecuritynews.info - 31/Aug 08:32

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to...

Sorry! Image not available at this time

Suspected Espionage Campaign Delivers New Voldemort Malware

itsecuritynews.info - 31/Aug 06:32

The campaign, which targeted organizations worldwide, involved impersonating tax authorities from various countries and utilizing Google Sheets for...

Sorry! Image not available at this time

OpenStack Ironic Users Urged to Patch Critical Vulnerability

itsecuritynews.info - 06/Sep 14:33

The flaw, discovered by security researchers at Red Hat and G-Research, could lead to unauthorized access to sensitive data through mishandled images...

Sorry! Image not available at this time

Litespeed Cache Flaw Exposes Millions of WordPress Sites to Takeover Attacks

itsecuritynews.info - 05/Sep 17:33

Discovered by security researcher Rafie Muhammad, the flaw allows unauthorized users to take control of logged-in accounts, potentially gaining...