Os atores de ameaças usam jogos piratas para ignorar o Microsoft Defender SmartScreen e Adblockers

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Os pesquisadores de segurança cibernética descobriram uma campanha sofisticada, onde os atores de ameaças aproveitam downloads de jogos pirateados para distribuir Hijackloaderum carregador de malware modular, ignorando efetivamente as defesas comuns, como Adblockers e Microsoft Defender SmartScreen. Sites como a Dodi reembalam, geralmente considerados “seguros” em fóruns de pirataria quando usados com ferramentas como o … Ler mais

Blue Locker Ransomware lança ataques direcionados ao setor de petróleo e gás no Paquistão

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan

A equipe nacional de resposta a emergências cibernéticas do Paquistão (NCERT) emitiu um aviso de alto alerta para 39 ministérios e instituições-chave, alertando de riscos graves do ransomware do “Locker Blue”, que comprometeu a infraestrutura crítica, incluindo a Pakistan Petroleum Limited (PPL) no setor de petróleo e óculos. Os ataques, coincidindo com o Dia da … Ler mais

XenoRAT malware campaign hits multiple embassies in South Korea

Picus Blue Report 2025

A state-sponsoredespionage campaign is targeting foreign embassies in South Korea to deployXenoRAT malware from malicious GitHub repositories. According to Trellix researchers, the campaign has been running since Marchand isongoing, having launched at least 19 spearphishing attacks against high-value targets. Although infrastructure and techniques match the pllaybook of North Korean actorKimsuky (APT43), there are signs that … Ler mais

Os atores de ameaças exploram o arquivo de índice de ajuda da Microsoft para implantar malware pipemagic

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

Os pesquisadores de segurança cibernética descobriram uma campanha sofisticada, onde os atores de ameaças aproveitam um arquivo de índice de ajuda da Microsoft (.MSHI) para implantar o backdoor Pipemagic, marcando uma evolução notável nos métodos de entrega de malware. Esse desenvolvimento se vincula à exploração do CVE-2025-29824, uma elevação de vulnerabilidade de privilégios de dia … Ler mais

ERMAC Android malware source code leak exposes banking trojan infrastructure

ERMAC Android malware source code leak exposes banking trojan infrastructure

The source code for version 3 of theERMACAndroid banking trojanhas been leaked online, exposing the internals of the malware-as-a-service platform and the operator’s infrastructure. The code base was discovered in an open directory by Hunt.io researchers while scanning for exposed resourcesin March 2024. They located an archive named Ermac 3.0.zip, which contained the malware’s code, … Ler mais

AI for Cybersecurity: Building Trust in Your Workflows

AI for Cybersecurity: Building Trust in Your Workflows

AI for Cybersecurity: Building Trust in Your Workflows In cybersecurity, speed matters, but trust is crucial. AI must ensure both rapid response and reliable decisions to avoid errors and disruption. In cybersecurity, speed matters. But speed without trust can be just as dangerous – if not more so – as no action at all. A … Ler mais

Pacote python armado "Termncolor" Usa a chave do Windows Run para persistência

Weaponized Python Package "termncolor" Uses Windows Run Key for Persistence

Especialistas em segurança cibernética descobriram um complexo ataque da cadeia de suprimentos que se originou do Python Package Index (PYPI) em uma recente divulgação do ZSCaler AmeaMlabz. O pacote em questão, denominado “TermNColor”, se disfarça de utilitário de cores benignas para terminais Python, mas importa secretamente uma dependência maliciosa chamada “Colorinal”. Essa dependência serve como … Ler mais

USB Malware Campaign Spreads Cryptominer Worldwide

USB Malware Campaign Spreads Cryptominer Worldwide

A multi-stage malware attack delivered via infected USB devices has been identified, raising concerns over the persistence of cryptomining threats in 2025. Analysts from CyberProof’s Managed Detection and Response (MDR) team discovered that the campaign used DLL search order hijacking and PowerShell to bypass security controls before attempting to install a cryptominer. The malware was … Ler mais

The AI Fix #64: AI can be vaccinated against evil, and the “Rumble in the Silicon Jungle”

The AI Fix #64: AI can be vaccinated against evil, and the “Rumble in the Silicon Jungle”

In episode 64 of The AI Fix, AI discovers new physics, a robot crab looks for love on the beaches of Portugal, the “Godfather of AI” thinks our only hope is to build motherly AI, a robot folds some laundry, the UK government has a terrible idea, and our hosts discover a long lost sixties … Ler mais

UK sentences “serial hacker” of 3,000 sites to 20 months in prison

Picus Blue Report 2025

A 26-year old in the UK who claimed to have hacked thousands of websites wassentenced to 20 months in prison after pleading guilty earlier this year. Al-Tahery Al-Mashriky ofRotherham, UK, was arrested in 2022 based on information received from U.S. law enforcement and charged for stealing log in details of millions of Facebook users, and … Ler mais