Notícias, Pontas, Laboratório de segurança

US DoJ stops Warzone RAT and arrests its operators

Warzone RAT Dismantled, Members Arrested

Em uma operação internacional de aplicação da lei, os EUA. Departamento de Justiça continua sua luta contra os cibercriminosos. The operation dismantled a

HijackLoader Malware Comes With New Evasion Methods

O malware HijackLoader adicionou novas técnicas de evasão de defesa. Other threat actors are increasingly using the malware to deliver payloads

New Fortinet VPN RCE Flaw Discovered, Patch ASAP

Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be

Shim Bootloader Vulnerability Affects Linux Systems

Os pesquisadores identificaram uma vulnerabilidade crítica no Shim, um gerenciador de inicialização Linux amplamente utilizado. This vulnerability could potentially allow attackers to execute

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

Um novo malware do Windows chamado Ov3r_Stealer está se espalhando por meio de anúncios de emprego falsos no Facebook, according to a report by Trustwave SpiderLabs.

RepoJacking and GitHub attacks

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are

Condi malware builds a botnet

Condi Malware Builds a Botnet from TP-Link Routers

Em maio 2023, um novo malware Condi, focused on DDoS

ChatGPT Accounts Are Compromised by Stealer Malware

Over 100k ChatGPT Accounts Are For Sale on the Darknet

De acordo com um novo relatório, durante o ano passado, sobre…

How to prevent companies from being compromised?

How Can Companies Be Secure Against Cyberattacks?

As organizações enfrentam uma realidade alarmante no mundo digital: dados…

APT28 attacked Ukrainian organizations

APT28 Attacked Ukrainian and Polish Organizations

Futuro Registrado, em colaboração com investigadores do CERT-UA, has unveiled a

Freaky Leaky SMS

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Os pesquisadores criaram um ataque de canal lateral chamado “SMS com vazamento estranho”,…

Darknet Forums and Malware Spreading: All You Need to Know

Malware Propagation On Darknet Forums

The forums on the dark web are well-known for being

Credentials Theft & Emails Scams - How to Protect?

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and

What is Corporate Digital Footprint and How to Protect It?

How to Protect Your Digital Footprint

The modern business world has been greatly advanced by the

Keys for Windows 11 Pro

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google

NortonLifeLock Hacked Via MOVEit Vulnerability

NortonLifeLock Hacked by Cl0P Gang, Using MOVEit Vulnerability

NortonLifeLock, o mundialmente famoso desenvolvedor de software antivírus, had reportedly been hacked

Shuckworm attacks Ukrainian companies

Shuckworm Gang Attacks Ukrainian Companies Using Pterodo Backdoor and USB Drives

Especialistas da Symantec relatam que o grupo de hackers Shuckworm (também conhecido como Armagedom,…