Notícias, Pontas, Laboratório de segurança

Fujitsu Data Leaked Due to Cyberattack

Fujitsu Hacked, Warns of Data Leak Possibility

Fujitsu, uma das principais empresas de TI do mundo, reports uncovering the hack in their internal network. The company discovered malware

Taskbarify Unwanted Application

Taskbarify is unwanted software that claims it is a tiny little Windows tweaker. No entanto, it also turns the device into

Trojan:Win32/Vigorf.A

Trojan:Win32/Vigorf.A is a generic detection of Microsoft Defender. This detection commonly identifies a running loader malware that may deal significant

Trojan:Win32/Znyonm

Trojan:Win32/Znyonm is a detection often seen during the backdoor malware activity in the background. Esse malware pode aumentar privilégios, enable

Fortinet RCE Vulnerability Affects FortiClient EMS Servers

Fortinet disclosed a critical vulnerability affecting FortiClient EMS products in March 2024. Esta vulnerabilidade, categorizado como uma injeção SQL, poses

Exim 0-day Vulnerablity Allows Executing Arbitrary Code

Exim Vulnerability Allows RCE, No Patches Available

Exim Internet Mailer, um programa amplamente utilizado como base…

RedLine and Vidar Developers Started Spreading Ransomware

Redline and Vidar Stealers Switch to Ransomware Delivery

Os cibercriminosos que estão por trás dos ladrões RedLine e Vidar decidiram…

Elon Musk cryptocurrency giveaway scams

TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams

Recentemente, TikTok has been inundated with a flood of cryptocurrency

Defending Against Whaling Phishing Attacks

What are Whaling Phishing Attacks?

Atores maliciosos conhecem executivos e funcionários de alto nível, such as public

3AM Ransomware Used As A Fallback For LockBit

3AM Ransomware Backs Up LockBit In Cyberattacks

Cybersecurity researchers have discovered a new family of ransomware called

What’s identity theft and how to prevent it?

What Is Identity Theft & How to Protect Against It

O roubo de identidade é um problema significativo que afeta milhões anualmente, whether

Chrome Vulnerability Allows for RCE Exploitation

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Google released an urgent security update for its Chrome browser.

Fake Telegram Apps Infected More than 10 million Users

Spyware in Fake Telegram Apps Infected Over 10 million Users

It is important to exercise caution when using messenger mods.

Pandora Botnet Exploits Android TVs for Attacks

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been

W3LL attacks Microsoft 365 accounts, bypassing MFA

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

No cenário em constante evolução das ameaças cibernéticas, crooks continually find

Conti and Trickbot Hackers Got Sanctioned By US and UK Authorities

NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers

Em setembro 7, 2023, NCA released a statement regarding the