O blog de segurança da Gridinsoft
North Korean Group Lazarus Attacks Energy Companies
Uma nova campanha de malware do grupo de hackers norte-coreano Lazarus foi descoberta, which was active from February to…
MooBot Botnet Attacks D-Link Routers
Especialistas descobriram que o botnet MooBot, baseado no malware Mirai IoT, attacks vulnerable D-Link routers using a combination…
The New Shikitega Malware Is Very Difficult to Detect and Eliminate
NO&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege…
SharkBot Malware Infiltrates Google Play Store Again
Especialistas em segurança da informação da Fox IT descobriram dois aplicativos na Google Play Store que distribuem o Trojan SharkBot: Mister…
Developer of CodeRAT Trojan Releases Source Code
O código-fonte do trojan de acesso remoto CodeRAT foi publicado no GitHub. This happened after the security researchers…
Samsung amends Android kernel that impair security
Jann Horn, Especialista em Projeto Zero do Google, estudou o kernel do Android,…
Xhelper Trojan remains on the device even after resetting to factory settings
O malware Xhelper continua a infectar dispositivos Android. Além disso, the Xhelper…
Microsoft recommends Exchange administrators to disable SMBv1
Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange…
Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products
Recent February “update Tuesday” became the largest for Microsoft in…
FBI warned about increase of supply chains attacks
The FBI has warned private sector companies of an active…
Trojan Emotet is trying to spread through available Wi-Fi networks
Binary Defense analysts noticed that the new version of the…
Dangerous vulnerability in Citrix software is still not resolved in 20% of companies
A month after the publication of information about a dangerous…
Lemon Duck malware operators attack IoT vendors
TrapX Security company experts warned about a new malicious campaign.…
Dangerous vulnerabilities in WhatsApp allowed compromising millions of users
Security researcher Gal Weizman from PerimeterX disclosed technical details of…
Cybercriminals increasingly use pirated software to deliver backdoors and ransomware
Cybersecurity experts once again warn that while pursuing for free…
Winnti hacking group attacked Hong Kong universities
ESET experts found that during protests that began back in…
US authorities can hack iPhone, but may have difficulties with Android
Although the US authorities are persistent in waging a “cryptographic…