Os atores de ameaças são representados como suporte do Google para farejar suas credenciais de login

Threat Actors Impersonate as Google Support to Sniff Out Your Login Credentials

Os atores de ameaças estão se apresentando como agentes de suporte do Google em um número crescente de ataques complexos de engenharia social, a fim de aproveitar as ferramentas de recuperação de contas e obter credenciais do usuário sem autorização. Essas campanhas aproveitam os canais de comunicação de aparência legítima, como números de telefone falsificados … Ler mais

Apple fixes new zero-day flaw exploited in targeted attacks

Picus Blue Report 2025

Apple has released emergency updates to patch another zero-day vulnerability that was exploited in an “extremely sophisticated attack.” Tracked as CVE-2025-43300, this security flaw is caused by an out-of-bounds write weakness discovered by Apple security researchers in the Image I/O framework, which enables applications to read and write most image file formats. An out-of-bounds write … Ler mais

LotkyLoader: um novo carregador de malware que espalha os infostealistas e os trojans de acesso remoto (ratos)

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

A IBM X-Force acompanhou o QuirkyLoader, um sofisticado malware de carregador implantado por atores de ameaças para distribuir famílias de destaque como agente Tesla, Asyncrat, Formbook, MassLogger, Remcos, Rhadamanthys e Snake Keylogger. Essa ameaça de vários estágios inicia por e-mails de spam de provedores legítimos ou servidores auto-hospedados, anexando arquivos maliciosos contendo um executável legítimo, … Ler mais

“Rapper Bot” malware seized, alleged developer identified and charged

Picus Blue Report 2025

The U.S. Department of Justice (DoJ)announced charges against the alleged developer and administrator ofthe “Rapper Bot”DDoS-for-hire botnet. Ethan Foltz, 22, of Eugene, Oregon, allegedly rented the botnet to cybercriminals eho targeted various organizations. The botnet operation itself was seized as part of ‘Operation PowerOff ‘on August 6, during a raid at Foltz’s residence in Oregon. … Ler mais

Os ataques de ransomware no Japão surgem 1,4 vezes, sinalizando um aumento significativo nas ameaças cibernéticas

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

O Japão teve um aumento significativo nos ataques de ransomware no primeiro semestre de 2025, com incidências aumentando cerca de 1,4 vezes no mesmo período do ano anterior. De acordo com uma investigação detalhada da Cisco Talos, 68 casos de ransomware direcionaram organizações japonesas, incluindo empresas domésticas e suas filiais no exterior, de janeiro a … Ler mais

Pharmaceutical Company Inotiv Confirms Ransomware Attack

Pharmaceutical Company Inotiv Confirms Ransomware Attack

Indiana-based pharmaceutical research firm Inotiv has confirmed that its systems were compromised in a ransomware attack earlier this month, disrupting parts of its business operations. According to a filing with the US Securities and Exchange Commission (SEC), the company detected the incident on August 8. Inotiv said attackers gained unauthorized access and encrypted some of … Ler mais

DOJ takes action against 22-year-old running RapperBot Botnet

DOJ takes action against 22-year-old running RapperBot Botnet

DOJ takes action against 22-year-old running RapperBot Botnet DOJ charges 22-year-old Ethan Foltz of Oregon for running RapperBot, a DDoS botnet behind 370K+ attacks in 80+ countries since 2021. The U.S. DOJ charged 22-year-old Ethan Foltz of Oregon for running the RapperBot botnet, used in over 370,000 DDoS-for-hire attacks since 2021. The criminal service is … Ler mais

Perplexity’s Comet AI browser tricked into buying fake items online

Prompt injection examples

A study looking into agentic AI browsers has found that these emerging tools are vulnerable to both new and old schemes that could make them interact with malicious pages and prompts. Agentic AI browsers can autonomously browse, shop, and manage various online tasks (like handling email, booking tickets, filing forms, or controlling accounts). Perplexity’s Comet … Ler mais

TRM Launches Industry-Wide Platform to Fight Crypto Crimes

TRM Launches Industry-Wide Platform to Fight Crypto Crimes

In an industry-first, TRM Labs has launched Beacon Network, an intelligence-sharing platform designed to prevent illicit funds from leaving the blockchain and build a real-time crypto crime response network. The initiative was announced on August 20 on the heels of new TRM Labs data that showed that at least $47bn in cryptocurrency has been sent … Ler mais

Os atores de ameaças exploram as plataformas de genai para criar ataques de phishing sofisticados e realistas

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites

A proliferação de plataformas generativas de IA (GENAI) revolucionou os serviços baseados na Web, permitindo assistência rápida de código, processamento de linguagem natural, implantação de chatbot e construção automatizada de sites. No entanto, os dados de telemetria revelam uma evolução preocupante no ecossistema de Genai, onde os atores de ameaças estão explorando cada vez mais … Ler mais