Notícias, Pontas, Laboratório de segurança

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE relata atividades de hackers em sua rede NERVE, visto em abril 2024. Ao detectar a atividade suspeita, a organização…

RegAsm.exe

O processo RegAsm.exe é um componente importante do sistema operacional Windows associado ao .NET Framework. Este utilitário é…

LabHost Phishing Service Taken Down by Police

As autoridades apreenderam o serviço de phishing LabHost, acusado de roubar informações pessoais de vítimas em todo o mundo. Este serviço especializado na criação…

Virus:Win32/Expiro

Virus:Win32/Expiro is a detection of Microsoft Defender that refers to a malware with backdoor capabilities. It allows attackers to control

Cisco Talos Warns of a Massive Brute Force Wave

A equipe de segurança do Cisco Talos divulgou informações sobre uma nova campanha de invasores visando o comprometimento em massa de contas. Os especialistas têm…

Adobe ColdFusion Vulnerabilities Exploited in the Wild

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks,…

Tortilla Ransomware Free Decryptor Available

Tortilla (Babuk) Ransomware Decryptor Available

Em janeiro 9, 2024, Avast and Cisco Talos announced the

OAuth2 Vulnerability Allows for Persistent Session Hijacking

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered

xDedic Actors Have Been Apprehended After a Five-year Hunt

xDedic Marketplace Members Detained In International Operations

O infame mercado xDedic, known for its illicit trade in

X/Twitter Crypto Scams From Verified Accounts

Verified X/Twitter Accounts Hacked to Spread Cryptoscams

The trend of hacking official accounts to promote cryptocurrency fraud

SMTP Smuggling - Global Email Security Threat

SMTP Smuggling is a New Threat to Email Security

Uma nova técnica de contrabando de SMTP teria o potencial de…

Mandiant's Account in X Hacked

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been

RCE Vulnerability In Qualcomm Chips Exposes Millions

Qualcomm RCE Vulnerabilities Expose Millions of Users

Vulnerability in several Qualcomm chipsets allows for remote code execution

SRLabs Releases Free Black Basta Ransomware Decryptor

Black Basta Ransomware Free Decryptor Available

Os pesquisadores do SRLabs publicaram um descriptografador gratuito para o ransomware BlackBasta. Eles…

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

No intrincado cenário da segurança cibernética, comprehending the various forms

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

Uma nova DLL (Biblioteca de links dinâmicos) Search Order Hijacking variant

MSIX Installer Protocol Exploited

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, devido a…