Malware, viết tắt của malicious software (phần mềm độc hại), chỉ loại phần mềm được thiết kế để gây hại, làm gián đoạn hoặc kiểm soát các hệ thống máy tính, mạng…
Tag: testing
Entenent el Malware: Tipus i Riscos
El malware, abreujat per software maliciós, es refereix a un tipus de software que està dissenyat per a danyar, interrompre o prendre el control dels sistemes informàtics, xarxes i dispositius sense el…
Comprendiendo el Malware: Tipos y Riesgos
El malware, abreviatura de software malicioso, se refiere a un tipo de software diseñado para dañar, interrumpir o tomar control de sistemas informáticos, redes y dispositivos sin el conocimiento o consentimiento del…
Comprendere il Malware: Tipi e Rischi
Il malware, abbreviazione di software dannoso, si riferisce a un tipo di software progettato per danneggiare, interrompere o prendere il controllo di sistemi informatici, reti e dispositivi senza la conoscenza o il…
Understanding Malware: Types and Risks – VIDEO
Malware, short for malicious software, refers to a type of software that is designed to harm, disrupt or take control of computer systems, networks, and devices without the user’s knowledge or consent….
Vice Society’s Custom Exfiltration Tool
The Vice Society ransomware gang has been spotted using a custom-made PowerShell tool to exfiltrate data from networks they have compromised. This tool is built to avoid detection by using in-built data…
Chinese hacking group uses GC2
Chinese state-sponsored hacking group APT41, also known as HOODOO, has been found using the Google Command and Control (GC2) tool to conduct data theft attacks against a Taiwanese media company and an…
Qbot’s Phishing Evolution
Qbot, a former banking trojan that generates initial access to corporate networks, has evolved into a malware that started using phishing campaigns to infect Windows devices. Security researchers noted that Qbot is…
New Android Vulnerabilities Threaten Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The first vulnerability, CVE-2023-20963, is an Android Framework Privilege Escalation Vulnerability that enables…
Backdoor Risk on x86 Machines
Despite ARM making progress, x86 machines still dominate the desktop and laptop space. However, these machines have a significant flaw that can compromise privacy and security: a hardware backdoor that can access…