Adobe remenda zero-day-vulnerability no Flash
Uma falha identificada e desconhecida no Adobe Flash está a ser explorada em ataques direcionados a vítimas da Coréia do Sul e será corrigida na semana de 5 de fevereiro.
Tópicos atuais sobre segurança da informação. A segurança informática é da responsabilidade de todos.
Uma falha identificada e desconhecida no Adobe Flash está a ser explorada em ataques direcionados a vítimas da Coréia do Sul e será corrigida na semana de 5 de fevereiro.
Google published a report on Android security Tuesday, announcing that more than 700,000 apps were removed from Google Play for violating marketplace policies.
2,000 WordPress sites (possibly more) are infected with a keylogger that’s being loaded on the WordPress backend login page and a crypto jacking script (in-browser cryptocurrency miner) on their frontends.
Cryptocurrency miners have begun using two older and already patched vulnerabilities to compromise servers to mine the Monero digital currency.
After gaining control of the coin-mining software, Satori bot replaces the victim wallet address with the malicious address. In this way, the computer mining currency through the address controlled by the attacker.
A Google security researcher has discovered a severe vulnerability in Blizzard games, played every month by half a billion users—World of Warcraft, Overwatch, Diablo III, Hearthstone and Starcraft II.
Hackers are using more sophisticated techniques to mine cryptocurrency in an unauthorized manner. They currently using ARP Poisoning to inject malicious code into all web requests on a Wi-Fi network.
Again crypto-jacking on Monero. PyCryptoMiner is a botnet cryptocurrency-oriented, designed in Python, that uses Pastebin as the source-pool when the C&C server is unavailable. It attacks Linux machines and exploits SSH service via brute-force.
Archive Poster Malware – The Chrome store claims that the extension affects 105,000 users, and presumably everyone is mining coins in their computer through this extension running in background.
As palavras “vetor de ataque” e “payload” (carga) têm dois significados bastante distintos dentro do contexto da segurança da informação embora por vezes persista alguma…
Numa rápida consulta às estatísticas de tráfego na Internet, percebe-se que o tráfego conhecido, solicitado (ou em outras palavras, legítimo) foi dominado pelo tráfego de…
By continuing to use the site, you agree to the use of cookies. more information