X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 20/Aug 03:32

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of phishing threat in which a…

Articles similaires

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

itsecuritynews.info - 05/Sep 09:32

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

itsecuritynews.info - 05/Sep 09:32

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

Quishing, an insidious threat to electric car owners

securityaffairs.co - 05/Sep 08:33

Quishing is a type of phishing attack where crooks use QR codes to trick users into providing sensitive information or downloading malware. In recent...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 11/Sep 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

itsecuritynews.info - 11/Sep 17:32

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to...

Sorry! Image not available at this time

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

itsecuritynews.info - 06/Sep 14:33

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By...

Sorry! Image not available at this time

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

itsecuritynews.info - 06/Sep 16:32

Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading booby-trapped...

Sorry! Image not available at this time

Crypto Mining and DDoS Threats: How Hadooken Malware Targets Oracle Web Logic Servers

itsecuritynews.info - 18:32

Threat actors were found exploiting poorly secured Oracle WebLogic servers for mining cryptocurrency, building a DDoS botnet, and other malicious...

Sorry! Image not available at this time

Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords

bleepingcomputer.com - 05/Sep 09:15

Hackers are targeting other hackers with a fake OnlyFans tool that claims to help steal accounts but instead infects threat actors with the Lumma...

Sorry! Image not available at this time

North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams

itsecuritynews.info - 07/Sep 08:32

Threat actors affiliated with North Korea have been observed leveraging LinkedIn as a way to target developers as part of a fake job recruiting...