X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 23/Aug 18:32

NGate Android Malware Relays NFC Traffic to Steal Credit Card Data

This malware allows attackers to emulate victims’ cards, enabling them to make unauthorized payments or withdraw cash from ATMs. The campaign has been active since November 2023. This article has been indexed from Cyware News – Latest Cyber News Read…

Articles similaires

Sorry! Image not available at this time

Veeam Backup & Replication Faces RCE Flaw Allows Full System Takeover

itsecuritynews.info - 07/Sep 08:32

A critical Remote Code Execution (RCE) flaw, CVE-2024-40711, with a CVSS score of 9. 8 has been discovered in Veeam Backup & Replication, allowing...

Sorry! Image not available at this time

Veeam Backup & Replication Faces RCE Flaw Allows Full System Takeover

itsecuritynews.info - 07/Sep 08:32

A critical Remote Code Execution (RCE) flaw, CVE-2024-40711, with a CVSS score of 9. 8 has been discovered in Veeam Backup & Replication, allowing...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

North Korean Cyberattacks Persist: Developers Targeted via npm Packages

itsecuritynews.info - 02/Sep 09:32

The campaign, known as “Contagious Interview,” tricks developers into downloading fake npm packages or installers. The attackers deploy a Python...

Sorry! Image not available at this time

North Korean Cyberattacks Persist: Developers Targeted via npm Packages

itsecuritynews.info - 02/Sep 09:32

The campaign, known as “Contagious Interview,” tricks developers into downloading fake npm packages or installers. The attackers deploy a Python...

Sorry! Image not available at this time

Unpatchable Zero-Day in Surveillance Cameras is Being Exploited to Install Mirai

itsecuritynews.info - 30/Aug 10:32

The vulnerability, known as CVE-2024-7029, allows attackers to remotely execute commands on the compromised device. The targeted device is the AVM1203...

Sorry! Image not available at this time

Rocinante: The Trojan Horse That Wanted to Fly

itsecuritynews.info - 31/Aug 08:32

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to...

Sorry! Image not available at this time

Litespeed Cache Flaw Exposes Millions of WordPress Sites to Takeover Attacks

itsecuritynews.info - 05/Sep 17:33

Discovered by security researcher Rafie Muhammad, the flaw allows unauthorized users to take control of logged-in accounts, potentially gaining...

Sorry! Image not available at this time

CISA Launches Cyber Incident Reporting Portal To Streamline Breach Disclosure

itsecuritynews.info - 02/Sep 10:02

The CISA has launched a cyber incident reporting portal to make breach disclosure easier. It allows organizations to report cyberattacks,...