Notícias, Pontas, Laboratório de segurança

Crypto Drainer Attack - How do They Work?

What are Crypto Draining Attacks? Signs & Mitigation

Entre uma grande variedade de possíveis golpes que envolvem criptomoedas, crypto draining attacks stand in their volume and amount of

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a

FalseFont Malware Targets Defence Contractors Worldwide

O grupo de hackers iraniano APT33 desenvolveu um novo malware chamado FalseFont. They use it to target the Defense Industrial

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications, enganando os usuários e colocando em risco os ativos digitais. This deceptive strategy hinges

What are Remote Encryption Attacks? Explanation & Mitigation

The digital world is seeing a surge in remote encryption attacks – um sofisticado ataque de ransomware. Although there is nothing

IceBreaker backdoor appeared in the wild

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

Um novo jogador apareceu no ciberespaço, with surprisingly new

RCE vulnerability in GTA Online

Dangerous RCE Vulnerability in GTA Online Fixed

Rockstar Games has finally released a patch for a dangerous

scam Pig Butchering

Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store

O golpe do abate de porcos, a scam operation that specializes in

Vulnerability in KeePass

Vulnerability in KeePass Allows Stealing All User Passwords in Plain Text

The developers of the open-source password manager KeePass explain that

Mass outage of Microsoft services

Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services

Semana passada, Microsoft 365 services around the world suffered a

Microsoft will block Excel XLL

Microsoft Will Block Excel XLL Files Downloaded from the Internet

Os desenvolvedores da Microsoft vão bloquear alguns suplementos do Excel (.44)…

Ransomware Income Dropped

Ransomware Revenues Dropped by 40% because Victims Refuse to pay

Receita de ransomware (de ataques de ransomware) caiu de $765.6 milhão…

Malware on GitHub Codespaces

Attackers Can Use GitHub Codespaces to Host and Deliver Malware

A Trend Micro relata que o ambiente de desenvolvimento em nuvem GitHub Codespaces,…

Malvertising in Google Search ads - What is That?

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements

access to OpenAI ChatGPT

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are

Goose Goose Duck

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

O detetive social gratuito Goose Goose Duck, which recently broke