Notícias, Pontas, Laboratório de segurança

PUADlmanager Win32/Installcore Detection Analysis & Removal

PUADlmanager Win32/InstallCore

PUADlmanager Win32/InstallCore is a detection that Microsoft Defender antivirus uses to detect potentially unwanted programs (PUA). It is a malware

XZ Utils Backdoor Discovered, Threating Linux Servers

Um backdoor na biblioteca liblzma, a part of XZ data compression tool was discovered by Andres Freund. The maintainer of

UnitedHealth Hack Leaks 6 TB of User Data

Grupo UnitedHealth, um dos maiores provedores de seguros de saúde e serviços de saúde nos Estados Unidos, suffered a

Microsoft SharePoint Vulnerability Exploited, Update Now

No final de março 2024, os EUA. Agência de Segurança Cibernética e Infraestrutura (CISA) issued the alert regarding the exploitation of a

PyPI Malware Spreading Outbreak Exploits Typosquatting

PyPI, um índice de pacotes Python, mais uma vez se tornou um lugar para propagação de malware. Threat actors registered hundreds of profiles

Zimbra vulnerability exploited in the wild

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, alvejando…

ALPHV Ransomware Gang Reports MeridianLink to SEC

ALPHV/BlackCat Ransomware Reports MeridianLink Hack To SEC

A gangue de ransomware ALPHV dá um passo sem precedentes: Files SEC Complaint Over

VMware Issues Urgent Warning About Unpatched Critical Cloud Director Vulnerability

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, um participante importante em serviços de virtualização, is reaching out

IPStorm Botnet Stopped by FBI, Key Operator Detained

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and

Plume Data Breach Published on the Darknet

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on

Reptar Vulnerability in Intel Allows to Escalate Privileges

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors

Moneris claimed by Medusa ransomware

Moneris Hacked, Medusa Ransomware Claims

A gigante canadense de fintech Moneris foi acusada de ter sido…

Trojanized CPU-Z Installer Promoted in Google Ads

Malicious CPU-Z Copy Is Spread In Google Search Ads

Attackers are again abusing the Google Ads platform to distribute

Boeing data breach

LockBit Ransomware Exposes Boeing’s 50GB of Data Leaked

Em um pesadelo de segurança cibernética, Boeing, a global aerospace and defense

SLP Vulnerability Used in DDoS attacks

SLP DDoS Amplification Vulnerability Actively Exploited

Num desenvolvimento recente, os EUA. Cybersecurity and Infrastructure Security

What is Windows Defender Security Warning?

What is Microsoft Security Warning Scam?

Fraudsteds massively employ Microsoft Azure hosting to start Microsoft Security

SecuriDropper Attack Androids Devices

SecuriDropper Bypasses Google Play & Android Defenses

SecuriDropper é um exemplo raro de malware dropper para Android…