New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks
A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest data from several email clients and nearly 40 web browsers. « ZPAQ is a file compression format that offers a better compression ratio and journaling function compared to widely used formats like ZIP and RAR, » G Data […]
WhatsApp prend en charge la vérification par email
Alors que le spectre de l’interopérabilité plane sur les messageries, WhatsApp multiplie les nouveautés, en étendant une des fonctions en cours de test : la possibilité de lier son compte à une adresse e-mail.
Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits. « Once Kinsing infects a system, it deploys a cryptocurrency mining script that exploits the host’s resources to mine cryptocurrencies like Bitcoin, resulting in significant damage to the infrastructure and a negative
How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes, CAPTCHAs, and steganography. See how they are carried out and learn to detect them. Quishing Quishing, a phishing […]
Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data. “Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by […]
Un téléobjectif 120 mm tétraprisme pour l’iPhone 16 Pro ?
A quelques jours de Thanksgiving, voici donc une autre petite rumeur sur l’iPhone 16 Pro. Après les photos de sa possible batterie aperçues hier, c’est au tour du capteur photo de faire parler lui.
Des entraînements sur mesure sur iPhone et Apple Watch avec l’App gratuite Kadens
Le développeur français et indépendant Maxime s’appuie sur le framework WorkoutKit pour proposer une application permettant d’élaborer des entrainements sur mesure.
Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific. « The campaigns leveraged legitimate […]
Le Mac Studio M2 Max débarque enfin sur le Refurb
Le Mac Studio doté de la puce M2 Max débarque enfin sur la boutique de produits reconditionnés par Apple avec une intéressante ristourne à la clé.
How to Install PostgreSQL 16 and pgAdmin on Debian 12
The post How to Install PostgreSQL 16 and pgAdmin on Debian 12 first appeared on Tecmint: Linux Howtos, Tutorials & Guides . PostgreSQL is a powerful, highly scalable, open source, and cross-platform object-relational database system that runs on Unix-like operating systems including Linux and Windows OS. It The post How to Install PostgreSQL 16 and […]