Security Technology
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
›
Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
›
A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintaine...
#72 - Quando a Técnica Vira Negócio: Empreendedorismo e Mitigação de DDoS com Daniel Damito
›
Neste episódio do Camada 8, conversamos com Daniel Damito, CEO e fundador da Sage Networks. Daniel falou sobre sua carreira, sua participaçã...
ATUALIZAÇÃO: Horário do incidente: 20 de jan. de 2026, 11:32 UTC
›
O incidente começou em 2026-01-20 11:32 Os horários estão listados no fuso horário UTC . Há mais um texto disponível em inglês. Acesse ...
ATUALIZAÇÃO: Horário do incidente: 20 de jan. de 2026, 11:32 UTC
›
O incidente começou em 2026-01-20 11:32 Os horários estão listados no fuso horário UTC . Há mais um texto disponível em inglês. Acesse ...
Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats
›
A Google Chrome extension with a "Featured" badge and six million users has been observed silently gathering every prompt entered ...
How Tech’s Biggest Companies Are Offloading the Risks of the A.I. Boom
›
The data centers used for work on artificial intelligence can cost tens of billions to build. Tech giants are finding ways to avoid being on...
Roomba Maker iRobot Files for Bankruptcy, With Chinese Supplier Taking Control
›
Founded in 1990 by three M.I.T. researchers, iRobot introduced its vacuum in 2002. Its restructuring will turn the company over to its large...
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
›
Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critica...
⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
›
If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently exploit...
Trump Moves to Stop States From Regulating AI With a New Executive Order
›
The order would create one federal regulatory framework for artificial intelligence, President Trump told reporters in the Oval Office. Font...
China Is Getting Much of What It Wants From the U.S., Including Chips
›
For China, President Trump’s moves to loosen chip controls, soften U.S. rhetoric and stay silent on tensions with Japan amount to a rare str...
Harold Hamm, Oklahoma Oil Tycoon, Allies With Trump to Reshape U.S. Energy
›
Harold Hamm, an Oklahoma oil tycoon, has played a central role in reshaping energy policy by allying himself with President Trump. Fonte: Le...
Can OpenAI Respond After Google Closes the A.I. Technology Gap?
›
A new technology release from OpenAI is supposed to top what Google recently produced. It also shows OpenAI is engaged in a new and more dif...
Celular Seguro vai bloquear aparelhos que não têm o app instalado
›
Nesta quinta-feira (11), o secretário-executivo do Ministério da Justiça e Segurança Pública (MJSP), Manoel Carlos de Almeida Neto, anuncio...
IA vence humanos em teste de hacking e acende alerta global
›
Após anos de tentativas pouco eficazes, ferramentas de inteligência artificial voltadas ao hacking finalmente atingiram um nível perigoso ...
Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data
›
A spoofed email address and an easily faked document is all it takes for major tech companies to hand over your most personal information. F...
React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
›
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Compon...
The Impact of Robotic Process Automation (RPA) on Identity and Access Management
›
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool...
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
›
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer t...
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
›
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by...
New React RSC Vulnerabilities Enable DoS and Source Code Exposure
›
The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result ...
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
›
Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable...
Atenção, usuários de Mac! Novo golpe começa com uma simples busca no Google
›
De acordo com dados de um relatório recente da Huntress , empresa especializada em detecção e resposta a ameaças, há um novo método de ata...
Warnings Mount in Congress Over Expanded US Wiretap Powers
›
Experts tell US lawmakers that a crucial spy program’s safeguards are failing, allowing intel agencies deeper, unconstrained access to Ameri...
Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
›
Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from the use of ha...
Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
›
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under ac...
2 Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’
›
The names of two partial owners of firms linked to the Salt Typhoon hacker group also appeared in records for a Cisco training program—years...
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
›
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to ac...
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks
›
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances access...
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
›
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Mi...
Trump’s Interest in Warner Bros. Deal Weighs On Justice Department
›
President Trump’s unusual decision to involve himself in the government’s review of the deal puts pressure on his antitrust chief. Fonte: Le...
How Clair Obscur: Expedition 33 Became a Gaming Tour de Force
›
Without a blockbuster budget or much experience, the creators of Clair Obscur: Expedition 33 astounded the industry with an emotional narrat...
Hatching the Automobile’s Future in a Cloistered Los Angeles Lab
›
Desperate to catch up with Chinese automakers, Ford is redesigning its fleet with a Silicon Valley-style team. Is it too late? Fonte: Leia a...
Um e-mail basta para IA do Comet apagar todo o seu Google Drive, alerta pesquisa
›
Pesquisadores da Straiker STAR Labs descobriram um ataque de clique zero (sem necessidade de clique) capaz de transformar o navegador C...
Joguei meu cartão de crédito fora e só pago com o celular pra não ser clonado
›
Substituir o cartão físico pelo pagamento via celular é uma das medidas mais eficazes para evitar fraudes financeiras e clonagens. Essa tec...
Cuidado! Hackers exploram IA e anúncios do Google para instalar malware
›
Hackers estão explorando ChatGPT , Grok e até o Google para convencer usuários a rodar comandos que permitem a instalação de malware . A ...
De deepfakes a SMS falsos: Golpes digitais explodem no Brasil, alerta relatório
›
Metade dos brasileiros sofreu algum tipo de golpe digital em 2024 , segundo relatório da empresa de segurança BioCatch publicado nesta se...
‹
›
Home
View web version