2015 ?????????????????????????????
赛门铁克互联网安全威胁报告 (ISTR) 第 20 期显示,网络攻击者通过拦截公司的基础架构渗透入网络,同时通过最终用户的智能手机和社交媒体向其勒索钱财。
Read More
赛门铁克互联网安全威胁报告 (ISTR) 第 20 期显示,网络攻击者通过拦截公司的基础架构渗透入网络,同时通过最终用户的智能手机和社交媒体向其勒索钱财。
Read More
This month the vendor is releasing 11 bulletins covering a total of 26 vulnerabilities. Thirteen of this month’s issues are rated ’Critical’.
Read More
Infrastructure owned by the Simda botnet (also known as Rloader) has been seized in an Interpol-led law enforcement operation.Read More
Ransomware attackers have resorted to reviving a very old attack vector, the malicious Word macro.Read More
Law enforcement agencies and security vendors join forces to take down long running malware delivery network.Read More
A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.Read More
Una nueva amenaza que roba información, denominada Trojan.Laziok, actúa como una herramienta de reconocimiento y permite a los atacantes recopilar información y adaptar sus métodos de ataque a cada computadora comprometida.
Read More
Attackers have been compromising users’ computers to add them to botnets, which are rented out to artificially inflate Twitch channel audience numbers.
Read More
Lone spam operator impersonated major brands and reality TV stars to promote miracle diet pill spam.Read More
Operador solitário de spam se fez passar por grandes marcas e estrelas de reality shows para promover spam de pílula de dieta milagrosa
Read More