Noticias, Consejos, Laboratorio de seguridad

scam Pig Butchering

Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store

La estafa de la matanza de cerdos, una operación fraudulenta que se especializa en inversiones falsas en proyectos de criptomonedas supuestamente prometedores, cepo, cautiverio, futuros…

Vulnerability in KeePass Allows Stealing All User Passwords in Plain Text

The developers of the open-source password manager KeePass explain that a vulnerability that allows an attacker to steal all user

Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services

La semana pasada, Microsoft 365 Los servicios en todo el mundo sufrieron una importante interrupción que duró unas cinco horas.. como la empresa…

Microsoft Will Block Excel XLL Files Downloaded from the Internet

Los desarrolladores de Microsoft van a bloquear algún complemento de Excel (.44) archivos para Microsoft 365. The new measures will include automatic

Ransomware Revenues Dropped by 40% because Victims Refuse to pay

Ingresos por ransomware (de ataques de ransomware) ha caído de $765.6 millones en 2021 a $456.8 millones en 2022, según Chainalysis…

SoftServe has been attacked by a ransomware

Ukraine’s largest IT company SoftServe has been attacked by a ransomware

Una de las empresas de TI más grandes de Ucrania., Servicio débil (número…

KryptoCibule malware steals cryptocurrency

KryptoCibule malware steals cryptocurrency from Windows users

ESET specialists discovered the KryptoCibule malware, which has been active

Shlayer bypassed Apple checks

Shlayer malware bypassed Apple security checks

Security expert Peter Dantini discovered that the Shlayer malware bypassed

not enter PIN code for VISA

Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards

Scientists from the Swiss Higher Technical School of Zurich have

Million dollars for hacking Tesla

Elon Musk confirmed that the Russian offered a Tesla employee a million dollars for hacking the company

A principios de esta semana, the US Department of Justice announced the

Twitter and Graphika neutralized Dracula

Twitter and Graphika neutralized Dracula propaganda botnet

Experts from the Graphika research group talked about how they

malicious plugin for 3Ds Max

Hackers use in attacks malicious plugin for 3Ds Max

Bitdefender experts have discovered a hacker group that is attacking

SpiKey allows opening lock

SpiKey technique allows opening the lock by recording a sound of a turning key

Scientists from the National University of Singapore have published a

Ukrainian Cyber Police and Binance

Ukrainian cyber police in cooperation with Binance detained operators of 20 cryptocurrency exchangers

Desde enero 2020, the Ukrainian cyber police began cooperating with

Microsoft will stop supporting IE

Microsoft developers will stop supporting classic Edge and IE 11

Microsoft dijo que dejaría de admitir Edge e IE clásicos…

Vulnerabilities in Amazon Alexa

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

In June this year, researchers from Check Point discovered a

ReVoLTE attack on LTE networks

ReVoLTE attack allows overhearing other people’s conversations in LTE networks

Experts from the Ruhr University and New York University in