O blog de segurança da Gridinsoft
Qakbot Botnet Hacked, Removed from Over 700,000 Machines
Qakbot, um botnet notório, foi derrubado por uma operação multinacional de aplicação da lei liderada pelo FBI, Operation “Duck…
Wilko Stock Liquidation Scams – Fake Shopping Sites
Recent events around the Wilko retail chain are sad for its customers, but may also expose folks to financial dangers.…
Botnet of 400,000 Devices Used as Proxy Nodes Uncovered
Cybercriminals used stealthy malware to create a botnet of 400,000 servidores proxy. Although the company providing the proxy services claims…
HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military
Os recentes ataques aos sistemas militares dos EUA e às empresas de Taiwan distinguem-se não apenas pela corajosa escolha do alvo, mas também…
Beware of Cryptocurrency Recovery Scams
Recentemente, the FBI reported increased scammers posing as companies offering to recover stolen cryptocurrency funds. These cunning intruders assure victims…
Lorenz Ransomware Penetrates Company Networks through Mitel VoIP Products
Security firm Arctic Wolf has warned that Lorenz ransomware is…
Ransomware publishes data stolen from Cisco
The Yanluowang hack group published data stolen from Cisco back…
0-day Vulnerability in WordPress BackupBuddy Plugin Attacked Over 5 million Times
Wordfence analysts have discovered that a fresh 0-day vulnerability in…
North Korean Group Lazarus Attacks Energy Companies
A new malware campaign by the North Korean hacker group…
MooBot Botnet Attacks D-Link Routers
Especialistas descobriram que o botnet MooBot, built on the…
The New Shikitega Malware Is Very Difficult to Detect and Eliminate
AT&T researchers have discovered a new Linux stealth malware called…
SharkBot Malware Infiltrates Google Play Store Again
Information security specialists from Fox IT discovered two applications in…
Developer of CodeRAT Trojan Releases Source Code
The source code for the CodeRAT remote access trojan has…
Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp
Experts from eSentire established that the infrastructure used to hack…
The Japanese Government Decided to Fight the Use of … Floppy Disks
Acontece que, mais do que 1,900 administrative procedures in…
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
De acordo com um novo relatório da Critical Insight, hackers are…