Notícias, Pontas, Laboratório de segurança
White Phoenix Decryptor by CyberArk Updated With Web Interface
CyberArk has released an online version of a file decryptor. Este é um simplificado, versão web do “Fênix Branca”…
GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk
Em uma nova atualização de segurança, GitLab has issued a patch for a critical vulnerability. This flaw could allow unauthorized users…
4 Junos OS Vulnerabilities Fixed, Update Now
No último boletim de segurança, Juniper Networks anunciou o lançamento de correções para uma seleção de vulnerabilidades em seus Junos…
Panda Security Driver Vulnerabilities Uncovered in APT Simulation
Pesquisadores de segurança descobriram vulnerabilidades críticas em drivers de segurança no software Panda Security. Esta cadeia de falhas abusa de drivers legítimos para desabilitar…
What is a Bootkit? Explanation & Protection Guide
Bootkit é bastante incomum e tácito, embora seja um tipo de malware amplamente utilizado. These advanced malware types operate beneath the…
New iOS Vulnerability Allows “Triangulation” Attack
New iOS vulnerability allows executing a zero-click malware delivery through…
DDoS-For-Hire Services Used by Hacktivists in 2023
Most people think you must be a hacker to participate…
Real People Perform CAPTCHA Solving Services for Hackers
Trend Micro analysts talked about several services that offer CAPTCHA…
Android Malware With Almost 500M Downloads Resides in Google Play
Milhões de usuários do Android podem estar em risco de um…
RarBG Torrenting Site Is Shut Down, Admins Explain Why
RarBG, one of the most famous torrent tracker websites in…
Ransomware Attacks in 2023: What to Expect?
Cybersecurity experts have published a report on worrying ransomware statistics.…
RaidForums Leaked, Data of Almost 500,000 Users Published
RaidFóruns, o ex-líder entre os fóruns clandestinos, now suffers…
New MDBotnet Malware Rapidly Expands a DDoS Network
MDBotnet is a new malware strain that appears to be…
Ransomware Attacks Decline in 2023 – Is It True?
De acordo com estatísticas de status de ataques de ransomware, the trend of incidents…
Attackers Can Use .Zip and .Mov Domains for Phishing
Especialistas’ fears that attackers will use new .zip and .mov…
US Authorities Warn of Disaster-Related Scams
Após desastres naturais e condições climáticas severas, there is a higher…
CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI
Users complain that the Discord CAPTCHA provided by hCaptcha forces…