top of page

Notícias

Código Malicioso

25 de abril de 2025

Anthropic finds alarming 'emerging trends' in Claude misuse report

Claude was used to create advanced malware and push paid political agendas on social media.

25 de abril de 2025

North Korean Hackers Use Fake Crypto Firms in Job Malware Scam

Silent Push reveals a complex scheme where North Korean hackers posed as crypto companies, using AI and fake…

25 de abril de 2025

Triada strikes back

Kaspersky expert has discovered a new version of the Triada Trojan, with custom modules for Telegram, WhatsApp, TikTok, and other apps.

24 de abril de 2025

Android spyware hidden in mapping software targets Russian soldiers

A new Android spyware was discovered in a fake Alpine Quest app, reportedly used by Russian soldiers for war zone planning. Doctor Web researchers uncovered a new spyware, tracked as Android.Spy.1292.origin, targeting Russian military personnel. The malicious code was hidden in a trojanized Alpine Quest app and spread via Russian Android catalogs. The malware steals […]

24 de abril de 2025

Tyton - Kernel-Mode Rootkit Hunter for Linux

Tyton is a lightweight, open-source kernel-mode rootkit detection tool for Linux systems. Designed to identify stealthy kernel-level threats, Tyton offers a focused approach to uncovering hidden modules and system call table hooks. Key Features Notifications: Users (including myself) do not actively monitor their journald logs, so a userland notification daemon has been included to monitor […]

24 de abril de 2025

Crooks exploit the death of Pope Francis

Crooks exploit the death of Pope Francis, using public curiosity and emotion to launch scams and spread malware, an old tactic during global events. After Pope Francis' death, cybercriminals launched scams and malware attacks, exploiting public curiosity, grief, and confusion. Cybercriminals are ready to exploit any event of global interest, it has already happened in […]

24 de abril de 2025

Linux 'io_uring' security blindspot allows stealthy rootkit attacks

A significant security gap in Linux runtime security caused by the 'io_uring' interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security software. [...]

24 de abril de 2025

ARMO: io_uring Interface Creates Security 'Blind Spot' in Linux

Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a "massive security loophole" in the operating system's runtime security. The post ARMO: io_uring Interface Creates Security 'Blind Spot' in Linux appeared first on Security Boulevard.

24 de abril de 2025

io_uring Is Back, This Time as a Rootkit

submitted by /u/Swimming_Version_605 [link] [comments]

23 de abril de 2025

Cybersecurity Blogs: What You Should Know in 2025

There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like malware and hacker attacks. Some blogs explain how to avoid scams, make good passwords, and […] The post Cybersecurity Blogs: What You Should Know in 2025 first appeared on Cybersecurity Insiders. The post Cybersecurity Blogs: What You Should Know in 2025 appeared first on Cybersecurity Insiders.

bottom of page