Notícias, Pontas, Laboratório de segurança

One More Flaw in Ivanti VPN Products

Third Ivanti VPN Vulnerability Under Massive Exploitation

Especialistas descobriram uma terceira falsificação de solicitação do lado do servidor (SSRF) vulnerabilidade nos produtos Ivanti. This is a serious security issue

Tax Season Scams On The Rise, Beware!

Tax season has already begun, e o mesmo aconteceu com os golpes na temporada de impostos. The IRS annually lists its top tax scams to

Docker API Vulnerability Exploited in Cryptojacking Campaign

Uma nova campanha chamada “Gato Comando” uses a Docker API vulnerability. It uses Docker to gain initial access to a

Hewlett Packard Enterprise Hacked, Darknet Forum Sales Data

Em fevereiro 1, 2024, apareceu uma postagem em um fórum de hackers Darknet vendendo dados da Hewlett Packard Enterprise. Threat actor known

Mastodon Vulnerability Allows for Account Takeover

Uma brecha de vulnerabilidade de segurança descoberta por especialistas em segurança cibernética revelou que a rede social descentralizada Mastodon contém uma vulnerabilidade crítica. Também,…

Cloud Mining Scams Spread Roamer, the Android banking trojan

Cloud Mining Scams Spread Banking Trojans

It’s no secret that cybercriminals are increasingly using mobile platforms

Russian-speaking Enlisted players

WannaCry 3.0 Ransomware Aims At Enlisted Russian-speaking Players

Uma carga de ransomware até então desconhecida, que se autodenomina WannaCry…

Fake security company is spreading malware through GitHub

Malware in GitHub Repositories Is Spread From Fake Security Company Name

Researchers detected fake company accounts on GitHub linked to a

BreachForums Back Online, Revived by ShinyHunters

BreachForums Is Back Online, Led by ShinyHunters

BreachFóruns, an infamous Darknet forum that was shut down in

new vulnerabilities in MOVEit Transfer

New critical vulnerabilities found in MOVEit Transfer

It became known that during the audit in the solution

RDP Honeypot Counted for 3.5 Million Attacks

RDP Honeypot Was Attacked 3.5 Million Times

Com aumento do trabalho remoto, IT teams use remote access tools

PoC Exploit for a vulnerability in Win32k

Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

Information security experts have published a PoC exploit for a

Batcloak obfuscation engine

BatCloak’s New Obfuscation Engine Outperforms 80% of Antiviruses

Pesquisadores da Trend Micro relataram recentemente que desde setembro 2022, atacantes…

Fortinet Fixes RCE Vulnerability in Two Software Solutions

Fortinet Fixes RCE Flaws in FortiOS and FortiProxy

Fortuna, um conhecido fornecedor de soluções de segurança de nível corporativo, issued an

Clop and MOVEit Transfer

Clop Attacks on MOVEit Transfer Affected British Airways, BBC and More

De acordo com pesquisadores de segurança, the Clop ransomware group has been

Third Party Data Breach

Third Party Data Breach: Definition and How to Prevent It

No cenário digital de hoje, data breaches have become an alarming

Android Malware Hides in Play Store as Legit Apps

Android Malware Mimics VPN, Netflix and Over 60k of Other Apps

Android é um sistema operacional aberto. This is an advantage