Noticias, Consejos, Laboratorio de seguridad
New Acer Breach Exposes 160GB of Data
Las empresas tienden a ocultar el caso de una violación de la ciberseguridad, por determinadas razones, it may be for their good.…
СhatGPT Became a Source of Phishing
A medida que el mundo digital continúa evolucionando, so do the tactics of online scammers who seem to have an unending…
BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11
Los expertos de ESET informaron que el kit de arranque BlackLotus UEFI, que se vende en foros de hackers por aproximadamente $ 5,000, is indeed…
New stealthy «Beep» malware focuses heavily on evading detection
Los ciberdelincuentes desarrollan periódicamente algo nuevo. A veces se trata de una versión actualizada de un malware ya conocido., and sometimes it is something…
LastPass Breach Investigation Goes On, Things are Even Worse
Ultimo pase, propiedad de ir a (anteriormente LogMeIn) y con más 30 millones de usuarios, revealed new details about the cyber incidents that…
NATO experimented with deceptive techniques to combat Russian hackers
Durante un ciberejercicio en Estonia en noviembre 16-20, OTAN…
The researcher showed how to steal a Tesla Model X in a few minutes
Information security specialist Lennert Wouters from the Catholic University of…
LidarPhone attack will make your vacuum cleaner spy on you
A group of scientists from the University of Maryland and…
Cybercriminals started using Google services more often in phishing campaigns
Security researchers have reported an increase in cyberattacks using Google…
Though 2020 is ending, the list of worst passwords is still topes «123456»
Se acerca fin de año, and the developers…
Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support
Los ingenieros de Google presentaron Chrome 87, in which was disabled FTP…
VoltPillager attack compromises Intel SGX
A group of researchers from the University of Birmingham have…
Microsoft accused Russia and North Korea of attacks on pharmaceutical companies
Microsoft representatives accused Russia and North Korea of attacks on…
CostaRicto mercenary hackers target financial institutions around the world
Los expertos de BlackBerry hablaron sobre el descubrimiento de un grupo de…
Microsoft urges users to opt out of multi-factor authentication via phone
Los expertos de Microsoft han vuelto a plantear la cuestión de la…
Platypus attack allows stealing data from Intel processors
Un grupo de científicos de la Universidad Técnica de Graz…
New Pay2Key ransomware encrypts corporate networks in just an hour
Varias empresas y grandes corporaciones en Israel han…