X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 02/Jan 18:32

DoubleClickjacking allows clickjacking on major websites

The “DoubleClickjacking” exploit bypasses protections on major websites, using a double-click sequence for clickjacking and account takeover attacks. DoubleClickjacking is a technique that allows attackers to bypass protections on major websites by leveraging a double-click sequence. Attackers can exploit the technique to…

Articles similaires

Sorry! Image not available at this time

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

itsecuritynews.info - 26/Mar 17:38

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model...

Sorry! Image not available at this time

Hackers Exploit COM Objects for Fileless Malware and Lateral Movement

itsecuritynews.info - 26/Mar 17:38

Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model...

Sorry! Image not available at this time

Critical Next.js Middleware Vulnerability Let Attackers Gain Unauthorized Access

itsecuritynews.info - 24/Mar 09:36

A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...

Sorry! Image not available at this time

Google Chrome was affected by CVE-2025-2783

thecyberthrone.in - 27/Mar 03:24

CVE-2025-2783 is a zero-day vulnerability affecting Google Chrome, uncovered in a targeted cyber-espionage campaign known as Operation ForumTroll....

Sorry! Image not available at this time

Google Chrome was affected by CVE-2025-2783

thecyberthrone.in - 27/Mar 03:24

CVE-2025-2783 is a zero-day vulnerability affecting Google Chrome, uncovered in a targeted cyber-espionage campaign known as Operation ForumTroll....

Sorry! Image not available at this time

CVE-2025-24071 POC Exploit released for Microsoft Flaw

thecyberthrone.in - 21/Mar 03:32

The CVE-2025-24071 vulnerability is a high security flaw identified in Windows File Explorer that allows attackers to steal NTLM hashed credentials...

Sorry! Image not available at this time

Elon Musk’s `X` Sues Indian Government Over Alleged Censorship, IT Act Violations

zeenews.india.com - 20/Mar 23:09

The lawsuit claims the government is using this section to create a separate content-blocking mechanism that bypasses the structured legal process...

Sorry! Image not available at this time

Linux Kernel Vulnerability Allows Attackers to Escalate Privileges via Out-of-Bounds Write

itsecuritynews.info - 20/Mar 06:12

A recently discovered vulnerability in the Linux kernel, identified as CVE-2025-0927, poses a significant threat to system security. This flaw,...

Sorry! Image not available at this time

Linux Kernel Vulnerability Allows Attackers to Escalate Privileges via Out-of-Bounds Write

itsecuritynews.info - 20/Mar 06:12

A recently discovered vulnerability in the Linux kernel, identified as CVE-2025-0927, poses a significant threat to system security. This flaw,...

Sorry! Image not available at this time

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

itsecuritynews.info - 26/Mar 06:11

Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783. This vulnerability has been...