Notícias, Pontas, Laboratório de segurança
What are Crypto Draining Attacks? Signs & Mitigation
Entre uma grande variedade de possíveis golpes que envolvem criptomoedas, crypto draining attacks stand in their volume and amount of…
UAC-0099 Targets Ukrainian Companies With Lonepage Malware
Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a…
FalseFont Malware Targets Defence Contractors Worldwide
O grupo de hackers iraniano APT33 desenvolveu um novo malware chamado FalseFont. They use it to target the Defense Industrial…
Cryptocurrency Scams on Twitter Exploit Post Features
Fraudsters are seen to exploit a feature of Twitter publications, enganando os usuários e colocando em risco os ativos digitais. This deceptive strategy hinges…
What are Remote Encryption Attacks? Explanation & Mitigation
The digital world is seeing a surge in remote encryption attacks – um sofisticado ataque de ransomware. Although there is nothing…
IceBreaker Backdoor Emerged, Exploiting New Phishing Way
Um novo jogador apareceu no ciberespaço, with surprisingly new…
Dangerous RCE Vulnerability in GTA Online Fixed
Rockstar Games has finally released a patch for a dangerous…
Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store
O golpe do abate de porcos, a scam operation that specializes in…
Vulnerability in KeePass Allows Stealing All User Passwords in Plain Text
The developers of the open-source password manager KeePass explain that…
Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services
Semana passada, Microsoft 365 services around the world suffered a…
Microsoft Will Block Excel XLL Files Downloaded from the Internet
Os desenvolvedores da Microsoft vão bloquear alguns suplementos do Excel (.44)…
Ransomware Revenues Dropped by 40% because Victims Refuse to pay
Receita de ransomware (de ataques de ransomware) caiu de $765.6 milhão…
Cybersecurity Specialists Advise Players Not to Enter Grand Theft Auto (GTA) Online due to a Dangerous Bug
Jogadores da versão para PC de Grand Theft Auto (GTA)…
Attackers Can Use GitHub Codespaces to Host and Deliver Malware
A Trend Micro relata que o ambiente de desenvolvimento em nuvem GitHub Codespaces,…
Google Search Malvertising: Fake Ads of Free Programs in Google Ads
Google Search malvertising is an unpleasant phenomenon of malicious advertisements…
Russian Cybercriminals Seek Access to OpenAI ChatGPT
Check Point analysts have noticed that Russian-speaking hacker forums are…
Goose Goose Duck Game Servers Are DDoS-Attacked Every Day
O detetive social gratuito Goose Goose Duck, which recently broke…