We live in a world where clever chatbots are being used to develop automated malware and malware that mutates to evade detection. With new threats emerging daily, it’s important to kee… Read More
Quando os cibercriminosos conseguem criptografar os dados das vítimas, a única maneira de conseguir essa descriptografação é pagando por um resgate ou agua… Read More
The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen Linux backdoor called SprySOCKS.Earth Lusca was first documented… Read More
In context: The Five Eyes (FVEY) alliance is a collaboration among the intelligence agencies of Australia, Canada, New Zealand, the United Kingdom, and the United States. In the past, the al… Read More
The Computer Emergency Response Team (CERT-In) of India issued an advisory addressing two Apple iTunes vulnerabilities. The bugs were found in Apple iTunes versions prior to 12.12.9 for Wind… Read More
The trillion-dollar industry of crypto which runs on mining software may become vulnerable to cyberattacks and lead to higher electrical and cooling costs, a report by Sophos has revealed… Read More
A Microsoft diz que os administradores devem remover algumas exclusões de antivírus recomendadas anteriormente para servidores Exchange. De acordo com a empresa, essa prá… Read More
When Rackspace Hosted Exchange service faced a ransomware attack in December, the root cause was traced to a zero-day exploit related to a Microsoft Exchange vulnerability (designated as CVE… Read More
An anonymous reader quotes a report from Ars Technica: Microsoft late Thursday confirmed the existence of two critical vulnerabilities in its Exchange application that have already compromis… Read More
Malware-free cybercrimes have reached 71% of the cases recorded annually, up from 62% in 2021, According to newest cybercrime trends by Crowdstrike.
In most cases, valid credentials were lev… Read More
Attackers are currently exploiting two unpatched vulnerabilities to remotely compromise on-premises Microsoft Exchange servers. Microsoft confirmed the flaws late last week and published mit… Read More
Há algumas décadas, Cuba se tornou uma pedra no sapato dos Estados Unidos. Ap´roveitanso-se da rivalidade, alguns hackers iniciaram uma operação ousada e in… Read More
The Cisco security researchers informed recently that another threat actors organization is targeting the Microsoft Exchange Server vulnerabilities to disseminate the ransomware “Babuk… Read More
Hacker tem escondido malwares em imagens PNG. A ameaça Worok infecta os computadores das vítimas com malware que rouba informações, ocultando malware em imagens P… Read More
Hacker Pwns Uber Via Compromised VPN Account
(published: September 16, 2022)
Background:
On September 15, 2022, ride-sharing giant Uber started an incident response after discovering a data… Read More
Investigadores da ESET, empresa europeia de cibersegurança, descobriram uma série de ciberataques que usam ferramentas nunca antes documentadas contra várias empresas de… Read More
Hackers are Targeting Microsoft Exchange servers using exploits to distribute malware. The vulnerabilities allow hackers to bypass detection by sending emails with malware attachments or mes… Read More
What Women Should Know Before Joining the Cybersecurity IndustryWomen still are underrepresented in software engineering and IT. And many times, cybersecurity gets lumped together with tho… Read More
Siber güvenlik şirketi ESET, casusluk yeteneklerine sahip bir arka kapı olarak tanımlanan TA410 ile ilgili araştırmasını yayınladı.
Ses kayd… Read More
The U.S. government, along with counterparts in Australia and the U.K, have warned that Iranian state-backed hackers are targeting U.S. organizations in critical infrastructure sectors -- in… Read More
Malware is short for "malicious software." This software can come in many forms. While their purpose can differ, they all can cause damage, and can be a pain to deal with.
And this time, r… Read More