X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 22/Oct 17:34

SOCs Have a Quishing Problem: Here’s How to Solve It

QR codes used to be harmless, now they’re one of the sneakiest ways attackers slip past defenses. Quishing, or QR code phishing, hides malicious links inside innocent-looking images that filters can’t read.  One scan, and the victim lands on a fake login page designed to steal…

Articles similaires

Sorry! Image not available at this time

The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools

bleepingcomputer.com - 15:02

Attackers exploit web browsers' built-in behaviors to steal credentials, abuse extensions, and move laterall, slipping past traditional defenses....

Sorry! Image not available at this time

The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools

bleepingcomputer.com - 15:02

Attackers exploit web browsers' built-in behaviors to steal credentials, abuse extensions, and move laterall, slipping past traditional defenses....

Sorry! Image not available at this time

OpenAI ChatGPT Atlas Browse Jailbroken to Disguise Malicious Prompt as URLs

itsecuritynews.info - 25/Oct 17:34

OpenAI’s newly launched ChatGPT Atlas browser, designed to blend AI assistance with web navigation, faces a serious security flaw that allows...

Sorry! Image not available at this time

New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials

itsecuritynews.info - 22/Oct 16:04

A sophisticated phishing kit dubbed Tykit, which impersonates Microsoft 365 login pages to harvest corporate credentials. First detected in May 2025,...

Sorry! Image not available at this time

New Phishing Wave Uses OAuth Prompts to Take Over Microsoft Accounts

itsecuritynews.info - 24/Oct 05:34

A new phishing campaign is targeting Microsoft account holders by using a clever twist on OAuth authentication prompts. Instead of asking users to...

Sorry! Image not available at this time

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension…

itsecuritynews.info - 26/Oct 10:34

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension campaign Short read for everyone: we found a malicious...

Sorry! Image not available at this time

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension…

itsecuritynews.info - 26/Oct 10:34

Hidden in Plain Sight: How we followed one malicious extension to uncover a multi-extension campaign Short read for everyone: we found a malicious...

Sorry! Image not available at this time

Hackers use RMM tools to breach freighters and steal cargo shipments

bleepingcomputer.com - 03/Nov 16:46

Threat actors are targeting freight brokers and trucking carriers with malicious links and emails to deploy remote monitoring and management tools...

Sorry! Image not available at this time

Microsoft 365 Copilot Flaw Lets Hackers Steal Sensitive Data via Indirect Prompt Injection

itsecuritynews.info - 21/Oct 14:04

 A vulnerability in Microsoft 365 Copilot allowed attackers to trick the AI assistant into fetching and exfiltrating sensitive tenant data by hiding...

Sorry! Image not available at this time

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

itsecuritynews.info - 23/Oct 08:35

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated...