abused

Google reCAPTCHA Abused in Multiple Phishing Campaigns

Senior-level executives in the banking and IT sectors are being targeted for their Office 365 credentials in a phishing campaign… Read More

3 years ago

Yet Another Chrome Zero-Day Vulnerability Being Abused in the Wild by Attackers

Chrome 89.0.4389.72, released for Windows, Mac, and Linux on Tuesday, comes with a total of 47 security fixes, the most… Read More

3 years ago

ISNs in Nine TCP/IP Stacks Could be Abused to Hijack Connections to Vulnerable Devices

According to new research from Forescout, inappropriately created ISNs (Initial Sequence Numbers) in nine TCP/IP stacks could be exploited to… Read More

3 years ago

Blocked accounts abused in Evolution CMS SQL injection attacks

On February 8, Synactiv revealed two security flaws in the CMS and how a “blocked account” can be exploited to… Read More

3 years ago

Google Chrome sync feature can be abused for C&C and data exfiltration

Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected browsers and steal… Read More

3 years ago

Windows Finger command abused by phishing to download malware

Image Source Link The 'Finger' command is a utility that originated in Linux/Unix operating systems that allows a local user… Read More

3 years ago

Top Penetration Testing Toolkits Abused by Cybercriminals

Image and Article Source link A security firm tracked tens and thousands of malware C&C servers used across over 80… Read More

3 years ago

Hackers abused Mimecast certificate to access Microsoft accounts

Image and Article Source link Mimecast disclosed a security incident in which a sophisticated threat actor has managed to get… Read More

3 years ago

Trust-Based Federated Login Abused for Local-to-Cloud Attacks | Cyware Hacker News

The NSA has produced a safety advisory detailing to assault strategies allegedly made use of by the SolarWinds hackers to… Read More

3 years ago

Zero-day in WordPress SMTP plugin abused to reset admin account passwords | ZDNet

Cybercriminals are resetting passwords for admin accounts on WordPress sites applying a zero-working day vulnerability in a preferred WordPress plugin… Read More

3 years ago

FBI warns of email forwarding rules being abused in recent hacks | ZDNet

The US Federal Bureau of Investigation states that cyber-criminals are progressively relying on e mail forwarding policies in buy to… Read More

3 years ago

A Look into the TLDs of the Most Abused Newly Registered Domains – Latest Hacking News

Even though the generic top-stage domain (gTLD) that a company works by using is not a telltale sign of maliciousness,… Read More

3 years ago

Google Forms Abused to Phish AT&T Credentials

Researchers are warning of phishing attacks leveraging Google Kinds as landing webpages to accumulate qualifications by masquerading as login web… Read More

4 years ago

Canva design platform actively abused in credentials phishing

As per a new report by cybersecurity company Cofense, menace actors are significantly applying Canva to make hosted HTML landing… Read More

4 years ago

Google App Engine feature abused to create unlimited phishing pages

A safety researcher demonstrated an meant structure of Google Application Engine's subdomain generator, which can be abused to use the… Read More

4 years ago

Windows 10 ‘Finger’ command can be abused to download or steal files

The list of native executables in Windows that can download or operate malicious code retains rising as a further one… Read More

4 years ago