Notícias
Código Malicioso
26 de fevereiro de 2026
Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue
Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the center of daily operations. Wireshark version 4.6.4 addresses two vulnerabilities affecting protocol dissectors and resolves a plugin compatibility issue within the 4.6 release series. Dissector vulnerabilities resolved The update fixes a crash in the HTTP3 dissector and an infinite loop in the MEGACO dissector. Both flaws could interrupt analysis activity … More → The post Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue appeared first on Help Net Security.
26 de fevereiro de 2026
Hottest cybersecurity open-source tools of the month: February 2026
This month's roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Pompelmi: Open-source secure file upload scanning for Node.js Software teams building services in JavaScript are adding more layers of defense to handle untrusted file uploads. An open-source project called Pompelmi aims to insert malware scanning and policy checks directly into Node.js applications before files reach storage or business logic. Allama: Open-source AI security automation Allama is an … More → The post Hottest cybersecurity open-source tools of the month: February 2026 appeared first on Help Net Security.
25 de fevereiro de 2026
Malware Analysis: How to Analyze and Understand Malware
Malware analysis is an amazing field that can be interesting, fun, and useful for your cybersecurity career. If you're wondering WHY anyone would want to dig into malware, it's all for a better understanding of cybersecurity! The post Malware Analysis: How to Analyze and Understand Malware appeared first on Black Hills Information Security, Inc..
25 de fevereiro de 2026
Medical Device Maker UFP Technologies Hit by Cyberattack
UFP Technologies appears to have been targeted in a ransomware attack that involved data theft and file-encrypting malware. The post Medical Device Maker UFP Technologies Hit by Cyberattack appeared first on SecurityWeek.
24 de fevereiro de 2026
Self-spreading npm malware targets developers in new supply chain attack
Security researchers have uncovered another supply chain attack targeting developers: 19 typosquatting npm packages published on npmjs.com that steal credentials, infect projects, and propagate themselves across developer environments. The operation, dubbed “SANDWORM_MODE,” represents a (still) rare example of worm-like malware designed to spread through software supply chains rather than traditional end-user systems. New npm worm builds on Shai-Hulud's playbook After last year's bombshell appearance of the self-replicating “Shai-Hulud” worm on the official npm registry, the … More → The post Self-spreading npm malware targets developers in new supply chain attack appeared first on Help Net Security.
