X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 23/Aug 07:32

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links that can lead to data theft or malware infection. This article has been indexed from Cyware News – Latest Cyber News…

Articles similaires

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

itsecuritynews.info - 02/Sep 12:02

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

Manufacturing Sector Under Fire From Microsoft Credential Thieves

itsecuritynews.info - 30/Aug 12:02

The spear-phishing emails impersonate reputable companies like Periscope Holdings and R.S. Hughes, prompting victims to surrender their Microsoft...

Sorry! Image not available at this time

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

itsecuritynews.info - 06/Sep 14:33

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By...

Sorry! Image not available at this time

Rocinante: The Trojan Horse That Wanted to Fly

itsecuritynews.info - 31/Aug 08:32

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to...

Sorry! Image not available at this time

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

itsecuritynews.info - 10/Sep 10:03

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to...

Sorry! Image not available at this time

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

itsecuritynews.info - 10/Sep 10:03

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional regions like Brazil and Argentina to...

Sorry! Image not available at this time

Cybercriminals Capitalize on Travel Industry’s Peak Season

itsecuritynews.info - 30/Aug 16:32

Cequence Security found that cyberattacks against the travel industry surge during holidays, with 91% of severe vulnerabilities in the top 10 travel...