O blog de segurança da Gridinsoft
Developer of CodeRAT Trojan Releases Source Code
O código-fonte do trojan de acesso remoto CodeRAT foi publicado no GitHub. This happened after the security researchers…
Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp
Especialistas da eSentire estabeleceram que a infraestrutura usada para hackear a Cisco em maio 2022 was exploited to compromise an unnamed…
The Japanese Government Decided to Fight the Use of … Floppy Disks
Acontece que, mais do que 1,900 procedimentos administrativos no Japão ainda exigem o uso de disquetes. Agora, o…
Malware Hides in Images from the James Webb Telescope
Os pesquisadores da Securonix notaram uma interessante campanha de malware que distribui um malware chamado GO#WEBBFUSCATOR escrito em Go. Hackers use phishing…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
De acordo com um novo relatório da Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack…
Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet
No início desta semana, Microsoft announced about vulnerability in Internet Explorer,…
Government hackers attacked companies more often in 2019
Organizations are more likely to become victims of state-sponsored cybercriminals.…
Unknown hacker patches vulnerable Citrix servers
Recentemente, in the public domain appeared exploits for the critical…
Greta Thunberg became the most popular character in phishing campaigns
Check Point analysts prepared a traditional monthly report on the…
IS specialist introduced a PoC exploit for one of the most dangerous vulnerabilities in Windows
The day after the release of the fix for one…
Microsoft released farewell updates for Windows 7 and Windows Server 2008
Em janeiro 14, 2020, Microsoft parou de oferecer suporte ao Windows 7 para…
Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company
Urso chique, also known as APT28, orchestrated an attack on…
Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips
Danish researchers have published a report on the Cable Haunt…
Researcher remotely hacked iPhone using only one vulnerability
Researcher in a few minutes remotely hacked iPhone using only…
Researchers hacked TikTok app via SMS
Check Point experts found many issues in one of the…
US Homeland Security warns of possible cyberattacks by Iran
Homeland Security USA issued a warning about possible acts of…
Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys
Uma das extensões para Google Chrome, Shitcoin Wallet injects…