Notícias, Pontas, Laboratório de segurança

USB Shortcut Virus Removal guide

USB Shortcut Virus

Vírus de atalho USB, é um programa malicioso que mexe com arquivos nos discos. It is a rather old

Personal Data vs. Sensitive Data: What is the Difference?

A tecnologia é cada vez mais importante em nossas casas, negócios, e dispositivos pessoais. Como resultado, we are generating more personal data

Data Breach & Data Leaks

Data leaks and Data Breaches are very similar phenomena with a slight difference in the principle of action. It was

GuptiMiner Use eScan to Spread Miners and Backdoors

Um relatório recente de pesquisadores da Avast identificou um malware antigo chamado GuptiMiner. Ele usa o mecanismo de atualização do antivírus eScan para…

Infostealers Made With Electron On The Rise

Centro de Inteligência de Segurança AhnLab (UM SEGUNDO) identificou uma nova cepa de malware Infostealer criada usando a estrutura Electron. Esses aplicativos…

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security

Definition of Bootkit

What is a Bootkit? Explanation & Protection Guide

Bootkit é bastante incomum e tácito, though widely used

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

Um novo ransomware chamado “Kasseika” uses Bring Your Own Vulnerable

Critical Auth Bypass Vulnerability in GoAnywhere MFT

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an

RCE Vulnerability in Confluence Exploited in the Wild

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in

TikTok Shopping Scams Gaining Momentum - How to Avoid?

TikTok Shopping Scams On The Rise: Tips to Avoid

À medida que o TikTok evolui para um mercado digital, its shopping feature

CISA Urges Patching Citrix RCE Vulnerability

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks

LockBit Ransomware Starts Using Word Files For Distribution, Again

LockBit Ransomware Uses Resume Word Files to Spread

A recent investigation by ASEC reveals the new tactics of

SonicWall API vulnerability has left 178,000 firewalls vulnerable to attacks.

Over 178,000 SonicWall Firewalls are Vulnerable to DoS and RCE

Recent research uncovers a significant portion of SonicWall firewall instances

Research Discover 9 Vulnerabilities in EDK II

9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II

Uma cadeia de 9 vulnerabilidades no ambiente de execução pré-inicialização da UEFI…

What is Facebook Job Scam?

What are Facebook Job Scams and How to Avoid Them?

Facebook is probably the most widely used social media globally.

New Chrome 0-day Vulnerability Exploited, Patch Available

New Google Chrome 0-day Vulnerability Exploited, Update Now

Nas notas de versão mais recentes, Google reports about a