Noticias, Consejos, Laboratorio de seguridad

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Tres complementos populares de WordPress, con decenas de miles de instalaciones activas, at once turned out to have critical SQL injection

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Los ingenieros de Microsoft han introducido una IA (inteligencia artificial) modelo de conversión de texto a voz llamado VALL-E. It is able to imitate a human

Was Your Apple ID Hacked? Here’s How To Secure Your Account

Solo se puede acceder a los servicios y productos de Apple a través de su jardín amurallado. Users can only access the company’s products and services

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

El grupo de piratería sudafricano Automated Libra está buscando nuevos enfoques para utilizar los recursos de las plataformas en la nube para…

Hackers compromised Slack private GitHub repositories

En diciembre 31, mientras todos celebraban el año nuevo, Fuerza de ventas, la empresa detrás del desarrollo del Slack corporativo…

five vulnerabilities in D-Link routers

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Los expertos de Loginsoft han informado sobre cinco vulnerabilidades graves encontradas en…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

Una popular herramienta de análisis de código automatizado, fuente profunda, is designed to

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos ha descubierto una nueva botnet, prometei, que era…

Google services used for phishing

Google cloud services are used for phishing

Atacantes, cuyo objetivo principal es robar varias credenciales, son…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Fin de semana pasado, uno de los proveedores de internet más grandes de Argentina, Telecomunicaciones Argentina,…

BadPower can set devices on fire

BadPower attack can set devices on fire

Expertos chinos del laboratorio Xuanwu (brazo de investigación de Tencent) have

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

A principios de esta semana, it became known that SAP engineers fixed

Microsoft fixed 123 vulnerabilities

On July «Patch Tuesday», only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has