X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 20/Aug 09:02

Cybercriminals Exploit Paris Olympics With Fake Domains

According to a report by cybersecurity researchers at BforeAI, threat actors used fake social media accounts, stores, ticketing systems, and fraudulent cryptocurrencies to target unsuspecting victims. This article has been indexed from Cyware News – Latest Cyber News Read the…

Articles similaires

Sorry! Image not available at this time

Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials

itsecuritynews.info - 28/Oct 11:36

Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to...

Sorry! Image not available at this time

Fake CAPTCHA Pages Used by Lumma Stealer to Spread Fileless Malware

itsecuritynews.info - 22/Oct 18:34

Lumma Stealer malware uses fake CAPTCHA to deceive victims. This information-stealing malware targets sensitive data like passwords and… This...

Sorry! Image not available at this time

Cybercriminals Exploit DocuSign APIs to Send Fake Invoices

itsecuritynews.info - 16:34

Cybercriminals are exploiting DocuSign APIs to send fake invoices, bypassing security filters and mimicking well-known brands This article has been...

Sorry! Image not available at this time

Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer

itsecuritynews.info - 30/Oct 21:32

A malvertising campaign is exploiting Meta’s platform to spread SYS01 infostealer, targeting men 45+ via fake ads for… This article has been...

Sorry! Image not available at this time

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

itsecuritynews.info - 24/Oct 03:04

Attacks on unprotected servers reach ‘critical level’ An unknown attacker is abusing exposed Docker Remote API servers to deploy perfctl...

Sorry! Image not available at this time

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

itsecuritynews.info - 23/Oct 16:37

It only takes five days on average for attackers to exploit a vulnerability, according to a new report. This article has been indexed from Security |...

Sorry! Image not available at this time

How African universities can fortify defenses against the growing threat of cyber attacks

gadgets-africa.com - 23/Oct 09:00

When thinking about industries that cybercriminals might target, tertiary education probably isn’t the first to come to mind. But according

Sorry! Image not available at this time

Cambodia-Based Cybercriminals Exploit Digital Arrest Scam on Indian Victims

itsecuritynews.info - 17:13

  Human traffickers, according to a report by India Today, are luring Indian citizens to Cambodia, offering them job opportunities, and then coercing...

Sorry! Image not available at this time

How to identify and avoid fake tokens

it-online.co.za - 28/Oct 10:20

A fake token attack is a type of cryptocurrency scam where malicious actors create counterfeit or fraudulent tokens that mimic legitimate...

Sorry! Image not available at this time

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

itsecuritynews.info - 13:15

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to launch highly evasive password...