X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 12/07/2024 05:11

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept and modify transactions, allowing hackers to drain bank accounts or make unauthorized purchases. BlackBerry cybersecurity researchers recently detected that the Coyote banking trojan has been actively…

Articles similaires

Sorry! Image not available at this time

Researchers Expose Deep Connections Between Maverick and Coyote Banking Malware

itsecuritynews.info - 11/Nov 08:10

Security researchers at CyberProof have uncovered critical connections between two sophisticated banking trojans Maverick and Coyote that are actively...

Sorry! Image not available at this time

Herodotus Trojan Mimics Human Typing to Steal Banking Credentials

itsecuritynews.info - 09/Nov 04:34

  A newly discovered Android malware, Herodotus, is alarming cybersecurity experts due to its unique ability to imitate human typing. This advanced...

Sorry! Image not available at this time

Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287

itsecuritynews.info - 04/Nov 06:34

Cybersecurity researchers and firewall monitoring services have detected a dramatic surge in reconnaissance activity targeting Windows Server Update...

Sorry! Image not available at this time

Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287

itsecuritynews.info - 04/Nov 06:34

Cybersecurity researchers and firewall monitoring services have detected a dramatic surge in reconnaissance activity targeting Windows Server Update...

Sorry! Image not available at this time

IT Security News Hourly Summary 2025-11-09 06h : 2 posts

itsecuritynews.info - 09/Nov 05:05

2 posts were published in the last hour 4:34 : Herodotus Trojan Mimics Human Typing to Steal Banking Credentials 4:6 : Chinese Hackers Attack...

Sorry! Image not available at this time

Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials

itsecuritynews.info - 15/Nov 12:06

Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive files...

Sorry! Image not available at this time

Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials

itsecuritynews.info - 15/Nov 12:06

Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive files...

Sorry! Image not available at this time

Critical FortiWeb flaw under attack, allowing complete compromise

securityaffairs.co - 14/Nov 12:41

A Fortinet FortiWeb auth-bypass flaw is being actively exploited, allowing attackers to hijack admin accounts and fully compromise devices....

Sorry! Image not available at this time

Critical FortiWeb flaw under attack, allowing complete compromise

securityaffairs.co - 14/Nov 12:41

A Fortinet FortiWeb auth-bypass flaw is being actively exploited, allowing attackers to hijack admin accounts and fully compromise devices....

Sorry! Image not available at this time

Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems

itsecuritynews.info - 08/Nov 04:38

  Cybersecurity researchers have recently discovered a new malware platform known as Atroposia, which is being promoted on dark web forums as a...