X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 22/Oct 07:05

Millions of Credentials Stolen Each Day by Stealer Malware

The cybercrime ecosystem surrounding stealer malware has reached unprecedented scale, with threat actors now processing millions of stolen credentials daily through sophisticated distribution networks. Security researchers have been monitoring these operations for nearly a year, revealing an alarming infrastructure that…

Articles similaires

Sorry! Image not available at this time

The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure

itsecuritynews.info - 21/Oct 17:04

The blockchain was supposed to revolutionize trust. Instead, it’s revolutionizing cybercrime. Every foundational principle that makes blockchain...

Sorry! Image not available at this time

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

itsecuritynews.info - 17/Oct 17:03

Cybercriminals associated with the North Korean threat group WaterPlum, also known as Famous Chollima or PurpleBravo, have escalated their activities...

Sorry! Image not available at this time

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

itsecuritynews.info - 17/Oct 17:03

Cybercriminals associated with the North Korean threat group WaterPlum, also known as Famous Chollima or PurpleBravo, have escalated their activities...

Sorry! Image not available at this time

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

itsecuritynews.info - 24/Oct 08:05

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob...

Sorry! Image not available at this time

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials

itsecuritynews.info - 25/Oct 21:05

Cybercriminals have adopted a sophisticated social engineering strategy that exploits the trust inherent in job hunting, according to a recent...

Sorry! Image not available at this time

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials

itsecuritynews.info - 25/Oct 21:05

Cybercriminals have adopted a sophisticated social engineering strategy that exploits the trust inherent in job hunting, according to a recent...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...

Sorry! Image not available at this time

AdaptixC2 Emerges in npm Supply-Chain Exploit Against Developers

itsecuritynews.info - 21/Oct 07:04

Cybersecurity researchers at Kaspersky have uncovered a sophisticated supply chain attack targeting the npm ecosystem, where threat actors distributed...

Sorry! Image not available at this time

Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials

itsecuritynews.info - 22/Oct 08:05

On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums, introducing...