Notícias, Pontas, Laboratório de segurança

FBot Malware Targets Cloud and Payment Services.

Novice FBot Stealer Targets Cloud Services

Pesquisadores relatam sobre uma nova cepa de malware chamada FBot. This Python-based malicious program appears to be a unique tool in

AzorUlt Stealer Is Back In Action, Uses Email Phishing

Especialistas em segurança cibernética encontraram o malware Azorult de oito anos. Este malware rouba informações e coleta dados confidenciais, and has been

Remcos RAT Targets South Korean Users Through Webhards

An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users

GitLab Zero-Click Account Hijack Vulnerability Revealed

Em janeiro 11, 2024, GitLab lançou uma atualização com o aviso oficial sobre a correção de violação crítica de segurança. A vulnerabilidade…

Windows SmartScreen Vulnerability Exploited to Spread Phemedrone Stealer

The malicious campaign exploits the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to spread Phemedrone Stealer. It utilizes intricate evasion

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

Corte de papel, uma solução de software usada para gerenciamento de impressão, appears to

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

Uma vulnerabilidade recentemente descoberta no SLP, um protocolo de rede legado, pode…

supply chain attack 3CX

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX

Capita Hacked by Black Basta Ransomware Gang

Capita Hacked, Black Basta Gang Publishes Data

capitão, uma empresa internacional de terceirização de processos de negócios com sede em Londres, foi hackeado…

Medusa, Bing and Cortana

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Especialistas do Google alertaram que os chineses “governo” hackear grupo…

5 Signs That You've Fallen Victim to a Scam

5 Signs That You’ve Fallen Victim to a Scam

A fraude na Internet está se tornando cada vez mais difundida e sofisticada. From simple

Legion hacker tool

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is

LockBit Released its Ransomware for macOS

LockBit Releases World’s First macOS Ransomware

Bloqueio, an infamous ransomware gang that became a major threat

Domino Uses Parts of Lizar Malware, Delivered by Dave Loader

Domino Backdoor is Lead by FIN7 and Conti Actors

Um novo Domino Backdoor apareceu no início de…

PDF Virus Documents - Are They Real?

Can PDFs Have Virus? Exploring the Risks of Downloading PDF Files

Entre vários outros arquivos, PDFs are considered one of the

BlackLotus UEFI bootkit

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the