Notícias, Pontas, Laboratório de segurança

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

Um novo ransomware chamado “Kasseika” usa táticas de trazer seu próprio driver vulnerável para desativar o software antivírus antes de criptografar arquivos. Kasseika…

GoAnywhere MFT Auth Bypass Vulnerability Discovered

O festival de vulnerabilidades em software corporativo continua com uma falha de desvio de autenticação no GoAnywhere MFT da Fortra. Avaliado no CVSS…

Confluence RCE Vulnerability Under Massive Exploitation

Pesquisadores estão vendo tentativas de explorar uma vulnerabilidade crítica em servidores Atlassian Confluence desatualizados. A falha permite que invasores executem…

TikTok Shopping Scams On The Rise: Tips to Avoid

À medida que o TikTok evolui para um mercado digital, seu recurso de compras apresenta um novo terreno repleto de oportunidades. No entanto, esta mudança…

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks to fix three vulnerabilities related to Citrix NetScaler and Google

GitLab Releases Patch to Critical Vulnerability

GitLab Releases Patch to Critical Vulnerability

GitLab, one of the most famous code repositories in the

Godaddy Refund Phishing Scam

GoDaddy Refund Phishing Emails Spread Infostealer

Hackers started using GoDaddy Refund Emails as a disguise to

Philadelphia Inquirer Falls Victim to Cuba Ransomware

Philadelphia Inquirer is Struck by Cuba Ransomware

O Inquiridor da Filadélfia, Philadelphia’s largest newspaper by circulation and third-longest-running

FIN7 resumed activity

FIN7 Hack Group Resumed Activity, Linked to Clop Ransomware

Microsoft analysts report that last month the notorious hacker group

What is ChatGPT Fleeceware?

ChatGPT Causes New Wave of Fleeceware

A inteligência artificial é um dos avanços mais significativos na…

What is Oneetx.exe Process?

Oneetx.exe – What is that process? Oneetx Removal

Oneetx.exe é um processo malicioso, related to Amadey dropper malware.

Python Package Index is Flooded with Malware

PyPI Malware Storm Forces to Suspend New Uploads

Índice de pacotes Python, um repositório de software para desenvolvedores Python, recentemente…

3 Less Popular Malware Spreading Ways

3 Unpopular Malware Spreading Ways in 2023

O espaço moderno da Internet é como um oceano sem fim, onde…

What Ducktail malware and how to avoid it?

Ducktail Infostealer Malware Targeting Facebook Business Accounts

Pesquisadores descobriram malware Ducktail, which targets individuals and organizations on

Malicious Plugins Were Detected on VSCode Marketplace

Visual Studio Code Malicious Plugins Steal Personal Data

Alguns plug-ins para Visual Studio Code, a popular code editing

Stealer Malware You Should Know and Be Aware Of

Infostealer Malware: Top Stealers in 2024

O mundo do crime cibernético muda rapidamente – tanto pela expansão, desmoronando, evolving

Malware in the firmware of Android devices

Trend Micro: Millions of Android Devices Contain Malware Right in the Firmware

Trend Micro analysts presented an interesting report at the Black