X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 20/Aug 03:32

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of phishing threat in which a…

Articles similaires

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

itsecuritynews.info - 05/Sep 09:32

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

itsecuritynews.info - 05/Sep 09:32

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

securityaffairs.co - 05/Sep 08:33

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

itsecuritynews.info - 06/Sep 14:33

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By...

Sorry! Image not available at this time

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

itsecuritynews.info - 06/Sep 16:32

Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading booby-trapped...

Sorry! Image not available at this time

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

bleepingcomputer.com - 05/Sep 09:15

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma...