X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 09/Aug 08:02

Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices

A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into installing malicious code.  The persistence mechanism allows threat actors to maintain covert control over the compromised device, facilitating data exfiltration…

Articles similaires

Sorry! Image not available at this time

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

itsecuritynews.info - 11:32

Two campaigns targeting Selenium Grid’s default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy...

Sorry! Image not available at this time

Chinese DragonRank Hackers Exploit Global Windows Servers in SEO Fraud

itsecuritynews.info - 11/Sep 19:32

DragonRank, a Chinese-speaking hacking group, has compromised 30+ Windows servers globally. They exploit IIS vulnerabilities to manipulate SEO… This...

Sorry! Image not available at this time

Chinese DragonRank Hackers Exploit Global Windows Servers in SEO Fraud

itsecuritynews.info - 11/Sep 19:32

DragonRank, a Chinese-speaking hacking group, has compromised 30+ Windows servers globally. They exploit IIS vulnerabilities to manipulate SEO… This...

Sorry! Image not available at this time

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild

itsecuritynews.info - 12/Sep 15:33

RCE attacks on WhatsUp Gold exploited the Active Monitor PowerShell Script to execute malicious code, as the vulnerabilities CVE-2024-6670 and...

Sorry! Image not available at this time

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild

itsecuritynews.info - 12/Sep 15:33

RCE attacks on WhatsUp Gold exploited the Active Monitor PowerShell Script to execute malicious code, as the vulnerabilities CVE-2024-6670 and...

Sorry! Image not available at this time

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

itsecuritynews.info - 06/Sep 19:32

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing...

Sorry! Image not available at this time

Threat Actors Abuse Red Team Tool MacroPack to Deliver Malware

itsecuritynews.info - 06/Sep 19:32

Cisco Talos researchers found that multiple bad actors were abusing the MacroPack framework, continuing an ongoing trend of hackers repurposing...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

CAMO Unveiled: How Cybercriminals Exploit Legitimate Software for Stealthy Attacks

itsecuritynews.info - 10/Sep 08:32

CAMO, short for Commercial Applications, Malicious Operations, showcases how cybercriminals are increasingly utilizing legitimate IT tools to evade...

Sorry! Image not available at this time

Cybercriminals Ramp Up Malvertising Schemes Through Google Searches

itsecuritynews.info - 10/Sep 16:32

  Malvertising, the practice of using online ads for malicious purposes, is on the rise, with incidents in the U.S. spiking by 42 per cent in fall...