Notícias
Código Malicioso
24 de abril de 2025
Android spyware hidden in mapping software targets Russian soldiers
A new Android spyware was discovered in a fake Alpine Quest app, reportedly used by Russian soldiers for war zone planning. Doctor Web researchers uncovered a new spyware, tracked as Android.Spy.1292.origin, targeting Russian military personnel. The malicious code was hidden in a trojanized Alpine Quest app and spread via Russian Android catalogs. The malware steals […]
24 de abril de 2025
Tyton - Kernel-Mode Rootkit Hunter for Linux
Tyton is a lightweight, open-source kernel-mode rootkit detection tool for Linux systems. Designed to identify stealthy kernel-level threats, Tyton offers a focused approach to uncovering hidden modules and system call table hooks. Key Features Notifications: Users (including myself) do not actively monitor their journald logs, so a userland notification daemon has been included to monitor […]
24 de abril de 2025
Crooks exploit the death of Pope Francis
Crooks exploit the death of Pope Francis, using public curiosity and emotion to launch scams and spread malware, an old tactic during global events. After Pope Francis' death, cybercriminals launched scams and malware attacks, exploiting public curiosity, grief, and confusion. Cybercriminals are ready to exploit any event of global interest, it has already happened in […]
24 de abril de 2025
ARMO: io_uring Interface Creates Security 'Blind Spot' in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a "massive security loophole" in the operating system's runtime security. The post ARMO: io_uring Interface Creates Security 'Blind Spot' in Linux appeared first on Security Boulevard.
23 de abril de 2025
Cybersecurity Blogs: What You Should Know in 2025
There are many blogs about cybersecurity. Some blogs are for people who are not experts. They help you learn how to stay safe online. Other blogs are for professionals who work in cybersecurity. These blogs talk about deep topics like malware and hacker attacks. Some blogs explain how to avoid scams, make good passwords, and […] The post Cybersecurity Blogs: What You Should Know in 2025 first appeared on Cybersecurity Insiders. The post Cybersecurity Blogs: What You Should Know in 2025 appeared first on Cybersecurity Insiders.