X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 19/Aug 11:02

Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks

Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. “Attackers can use Xeon to send messages through multiple software-as-a-service (SaaS) providers using valid…

Articles similaires

Sorry! Image not available at this time

Phishing Campaigns Surge with New Header Refresh Technique, Targeting Financial and Government Sectors

itsecuritynews.info - 14:32

In 2024, Unit 42 researchers observed a sharp increase in large-scale phishing campaigns using a novel technique involving the HTTP response header....

Sorry! Image not available at this time

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

itsecuritynews.info - 06/Sep 19:32

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing...

Sorry! Image not available at this time

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

itsecuritynews.info - 06/Sep 19:32

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing...

Sorry! Image not available at this time

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

itsecuritynews.info - 13/Sep 09:32

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199. By exploiting...

Sorry! Image not available at this time

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

itsecuritynews.info - 13/Sep 09:32

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199. By exploiting...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 11/Sep 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

itsecuritynews.info - 11/Sep 15:32

CAMO, or Commercial Applications, Malicious Operations, highlights attackers’ increasing reliance on legitimate IT tools to bypass security...

Sorry! Image not available at this time

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

itsecuritynews.info - 06/Sep 14:33

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By...

Sorry! Image not available at this time

Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw

itsecuritynews.info - 13/Sep 12:32

Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software...

Sorry! Image not available at this time

Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw

itsecuritynews.info - 13/Sep 12:32

Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software...