Notícias, Pontas, Laboratório de segurança

SRLabs Releases Free Black Basta Ransomware Decryptor

Black Basta Ransomware Free Decryptor Available

Os pesquisadores do SRLabs publicaram um descriptografador gratuito para o ransomware BlackBasta. They discovered the vulnerability in the way malware handles the encryption

Seven Common Types of Malware – Analysis & Description

No intrincado cenário da segurança cibernética, comprehending the various forms of malware is crucial. This article offers an in-depth look

DLL Search Order Hijacking Technique Bypasses Protection

Uma nova DLL (Biblioteca de links dinâmicos) Surgiu uma variante de sequestro de pedido de pesquisa. This method capitalizes on executables in the trusted WinSxS

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, devido à sua exploração em ataques cibernéticos do mundo real. Hackers found a way to

PUABundler:Win32/PiriformBundler

PUABundler:Win32/PiriformBundler é a detecção de um programa indesejado, desenvolvido e emitido pela Piriform Software. While applications from this developer aren’t

Blue Screen of Death Scams

Fake BSOD Scams Target Users Visiting Fake Adult Sites

The blue screen of death is probably the most unpleasant

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach

СhatGPT Became a Source of Phishing

СhatGPT Became a Source of Phishing

À medida que o mundo digital continua a evoluir, so do the

BlackLotus UEFI Bootkit

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

Especialistas da ESET relataram que o bootkit BlackLotus UEFI, qual é…

What is Beep Malware?

New stealthy “Beep” malware focuses heavily on evading detection

Os cibercriminosos desenvolvem periodicamente algo novo. Sometimes it is an updated

LastPass Breach Is Bigger Than It Was Expected

LastPass Breach Investigation Goes On, Things are Even Worse

Última passagem, propriedade da GoTo (anteriormente LogMeIn) and with over 30

YouTube and Pixel smartphones

YouTube Video Causes Pixel Smartphones to Reboot

Users have found that Pixel smartphones powered by Google Tensor

imitating a voice with AI

The Researcher Hacked His Own Bank Account by Imitating a Voice with AI

The journalist Vice Motherboard Joseph Cox hacked the bank account

New Methods of QakBot Spyware Distribution

Qakbot Malware Applies New Distribution Methods

Today there is an arms race between cybercriminals and antimalware

heads of cybersecurity departments

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

De acordo com um novo relatório do Gartner, por 2025, aproximadamente…

Impact of Russian-Ukrainian War on Cybersecurity

One Year of Russian-Ukrainian War in Cybersecurity

Fevereiro 24, 2022, will be a turning point in history.

Activision's Slack

Hackers Broke into Activision’s Slack and Stole Data

Activisão, a editora de jogos de computador (including the Call of