fp-3b
-
Read moreThe Coyote banking Trojan, active since February 2024, is the first malware to exploit the Windows UI Automation framework, targeting banks and crypto exchanges in Brazil. Learn how it operates and the risks involved.
-
Read moreA new variant of the macOS.ZuRu malware exploits a compromised Termius SSH client to turn developer workstations into remote access points. Learn about the risks and how to protect your systems.
-
Read moreNovabev Group confirmed a ransomware attack on July 14, 2025, disrupting operations and IT infrastructure. The company refuses to pay ransom and assures customer data remains secure.
-
Read moreA sophisticated phishing campaign is targeting Node.js developers through a typosquatted domain, npnjs.com. Learn how attackers are impersonating the npm package registry and what you can do to protect your credentials.
-
Read moreCybersecurity researchers have uncovered a new attack method by the PoisonSeed group that exploits FIDO key protections through QR phishing and cross-device sign-in. Learn how this technique deceives users and compromises account security.