RSS Generator 2.1.1http://www.rssboard.org/rss-specificationResecurity
https://www.resecurity.com/pt
Blogpthttps://www.resecurity.com/themes/modern/images/logo-dark.svgResecurity
/
15040ResecurityGEOINT in the Iran War: Targeting, Intelligence, and the Battle for Information Access
https://www.resecurity.com/pt/blog/article/geoint-in-the-iran-war-targeting-intelligence-and-the-battle-for-information-access
https://www.resecurity.com/pt/blog/article/geoint-in-the-iran-war-targeting-intelligence-and-the-battle-for-information-accessTue, 14 Apr 2026 00:00:00 -0500Data Breach Victim Notification Program (DBVNP)
https://www.resecurity.com/pt/blog/article/data-breach-victim-notification-program-dbvnp
https://www.resecurity.com/pt/blog/article/data-breach-victim-notification-program-dbvnpMon, 13 Apr 2026 00:00:00 -0500CVE-2026-25769: Critical Remote Code Execution in Wazuh via Unsafe Deserialization
https://www.resecurity.com/pt/blog/article/cve-2026-25769-critical-remote-code-execution-in-wazuh-via-unsafe-deserialization
https://www.resecurity.com/pt/blog/article/cve-2026-25769-critical-remote-code-execution-in-wazuh-via-unsafe-deserializationWed, 08 Apr 2026 00:00:00 -0500Supply Chain Malware Alert: plain-crypto-js Compromises Axios Packages
https://www.resecurity.com/pt/blog/article/supply-chain-malware-alert-plain-crypto-js-compromises-axios-packages
https://www.resecurity.com/pt/blog/article/supply-chain-malware-alert-plain-crypto-js-compromises-axios-packagesSat, 04 Apr 2026 00:00:00 -0500 Pro-Iranian Nasir Security is Targeting The Energy Sector in the Middle East
https://www.resecurity.com/pt/blog/article/pro-iranian-nasir-security-is-targeting-the-energy-sector-in-the-middle-east
https://www.resecurity.com/pt/blog/article/pro-iranian-nasir-security-is-targeting-the-energy-sector-in-the-middle-eastMon, 23 Mar 2026 00:00:00 -0500Iran War: Kinetic, Cyber, Electronic and Psychological Warfare Convergence
https://www.resecurity.com/pt/blog/article/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergence
https://www.resecurity.com/pt/blog/article/iran-war-kinetic-cyber-electronic-and-psychological-warfare-convergenceTue, 17 Mar 2026 00:00:00 -0500Inside Tycoon 2FA: Disrupting a Global Phishing Operation
https://www.resecurity.com/pt/blog/article/inside-tycoon-2fa-disrupting-a-global-phishing-operation
https://www.resecurity.com/pt/blog/article/inside-tycoon-2fa-disrupting-a-global-phishing-operationFri, 06 Mar 2026 00:00:00 -0600Cyber Battlefield: Ariomex, Iran-Based Crypto Exchange, Suffers Data Leak
https://www.resecurity.com/pt/blog/article/cyber-battlefield-ariomex-iran-based-crypto-exchange-suffers-data-leak
https://www.resecurity.com/pt/blog/article/cyber-battlefield-ariomex-iran-based-crypto-exchange-suffers-data-leakMon, 02 Mar 2026 00:00:00 -0600Clawdbot / Moltbot: The Autonomous AI Butler That Could Expose Your Entire Digital Life
https://www.resecurity.com/pt/blog/article/clawdbot-moltbot-the-autonomous-ai-butler-that-could-expose-your-entire-digital-life
https://www.resecurity.com/pt/blog/article/clawdbot-moltbot-the-autonomous-ai-butler-that-could-expose-your-entire-digital-lifeFri, 06 Feb 2026 00:00:00 -0600Breaking Trust with Words: Prompt Injection Leading to Simulated /etc/passwd Disclosure
https://www.resecurity.com/pt/blog/article/breaking-trust-with-words-prompt-injection-leading-to-simulated-etcpasswd-disclosure
https://www.resecurity.com/pt/blog/article/breaking-trust-with-words-prompt-injection-leading-to-simulated-etcpasswd-disclosureSun, 25 Jan 2026 00:00:00 -0600CVE-2026-22794: Changing the Origin Header to Take Over Appsmith Accounts
https://www.resecurity.com/pt/blog/article/cve-2026-22794-changing-the-origin-header-to-take-over-appsmith-accounts
https://www.resecurity.com/pt/blog/article/cve-2026-22794-changing-the-origin-header-to-take-over-appsmith-accountsWed, 21 Jan 2026 00:00:00 -0600PDFSIDER Malware - Exploitation of DLL Side-Loading for AV and EDR Evasion
https://www.resecurity.com/pt/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasion
https://www.resecurity.com/pt/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-and-edr-evasionSun, 18 Jan 2026 00:00:00 -0600Doomsday for Cybercriminals — Data Breach of Major Dark Web Forum
https://www.resecurity.com/pt/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru
https://www.resecurity.com/pt/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foruFri, 09 Jan 2026 00:00:00 -0600Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters'
https://www.resecurity.com/pt/blog/article/cyber-counterintelligence-cci-when-shiny-objects-trick-shiny-hunters
https://www.resecurity.com/pt/blog/article/cyber-counterintelligence-cci-when-shiny-objects-trick-shiny-huntersTue, 06 Jan 2026 00:00:00 -0600Knownsec Data Breach: A Trove of Espionage Tradecraft with an Insider Narrative
https://www.resecurity.com/pt/blog/article/knownsec-data-breach-a-trove-of-espionage-tradecraft-with-an-insider-narrative
https://www.resecurity.com/pt/blog/article/knownsec-data-breach-a-trove-of-espionage-tradecraft-with-an-insider-narrativeWed, 31 Dec 2025 00:00:00 -0600MongoBleed (CVE-2025-14847): MongoDB Memory Leak Flaw
https://www.resecurity.com/pt/blog/article/mongobleed-cve-2025-14847-mongodb-memory-leak-flaw
https://www.resecurity.com/pt/blog/article/mongobleed-cve-2025-14847-mongodb-memory-leak-flawTue, 30 Dec 2025 00:00:00 -0600CVE-2025-68613: Remote Code Execution via Expression Injection in n8n
https://www.resecurity.com/pt/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2
https://www.resecurity.com/pt/blog/article/cve-2025-68613-remote-code-execution-via-expression-injection-in-n8n-2Fri, 26 Dec 2025 00:00:00 -0600React2Shell Explained (CVE-2025-55182): From Vulnerability Discovery to Exploitation
https://www.resecurity.com/pt/blog/article/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitation
https://www.resecurity.com/pt/blog/article/react2shell-explained-cve-2025-55182-from-vulnerability-discovery-to-exploitationWed, 24 Dec 2025 00:00:00 -0600Synthetic Data: A New Frontier for Cyber Deception and Honeypots
https://www.resecurity.com/pt/blog/article/synthetic-data-a-new-frontier-for-cyber-deception-and-honeypots
https://www.resecurity.com/pt/blog/article/synthetic-data-a-new-frontier-for-cyber-deception-and-honeypotsWed, 24 Dec 2025 00:00:00 -0600DIG AI: Uncensored Darknet AI Assistant at the Service of Criminals and Terrorists
https://www.resecurity.com/pt/blog/article/dig-ai-uncensored-darknet-ai-assistant-at-the-service-of-criminals-and-terrorists
https://www.resecurity.com/pt/blog/article/dig-ai-uncensored-darknet-ai-assistant-at-the-service-of-criminals-and-terroristsThu, 18 Dec 2025 00:00:00 -0600