X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 11/11/2024 11:04

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices.  By stealthily capturing screenshots, the malware bypasses traditional security measures that rely on text-based detection, which allows it to efficiently…

Articles similaires

Sorry! Image not available at this time

Pixnapping Malware Exploits Android’s Rendering Pipeline to Steal Sensitive Data from Google and Samsung Devices

itsecuritynews.info - 21/Oct 15:34

  Cybersecurity researchers have revealed a new Android malware attack called Pixnapping, capable of stealing sensitive information from Google and...

Sorry! Image not available at this time

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

itsecuritynews.info - 26/Oct 00:04

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting...

Sorry! Image not available at this time

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

itsecuritynews.info - 26/Oct 00:04

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting...

Sorry! Image not available at this time

New Stealit Malware Attacking Windows Systems Abuses Node.js Extensions

itsecuritynews.info - 13/Oct 11:32

A sophisticated new malware campaign targeting Windows systems has emerged, leveraging Node.js Single Executable Application (SEA) features to...

Sorry! Image not available at this time

New Stealit Malware Attacking Windows Systems Abuses Node.js Extensions

itsecuritynews.info - 13/Oct 11:32

A sophisticated new malware campaign targeting Windows systems has emerged, leveraging Node.js Single Executable Application (SEA) features to...

Sorry! Image not available at this time

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

itsecuritynews.info - 25/Oct 02:05

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade...

Sorry! Image not available at this time

Astaroth Trojan abuses GitHub to host configs and evade takedowns

itsecuritynews.info - 13/Oct 11:32

The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee...

Sorry! Image not available at this time

Astaroth Trojan abuses GitHub to host configs and evade takedowns

itsecuritynews.info - 13/Oct 11:32

The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings from the platform. McAfee...

Sorry! Image not available at this time

Researchers Unveil “Pixnapping” Attack That Steals Android App Data Under a Minute

techdigest.ng - 14/Oct 19:17

Security researchers have developed a new technique to extract sensitive information from Android apps—including two-factor authentication (2FA)...

Sorry! Image not available at this time

Researchers Unveil “Pixnapping” Attack That Steals Android App Data Under a Minute

techdigest.ng - 14/Oct 19:17

Security researchers have developed a new technique to extract sensitive information from Android apps—including two-factor authentication (2FA)...