Noticias, Consejos, Laboratorio de seguridad
Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network
Tres complementos populares de WordPress, con decenas de miles de instalaciones activas, at once turned out to have critical SQL injection…
Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern
Los ingenieros de Microsoft han introducido una IA (inteligencia artificial) modelo de conversión de texto a voz llamado VALL-E. It is able to imitate a human…
Was Your Apple ID Hacked? Here’s How To Secure Your Account
Solo se puede acceder a los servicios y productos de Apple a través de su jardín amurallado. Users can only access the company’s products and services…
Hackers Bypass CAPTCHA on GitHub to Automate Account Creation
El grupo de piratería sudafricano Automated Libra está buscando nuevos enfoques para utilizar los recursos de las plataformas en la nube para…
Hackers compromised Slack private GitHub repositories
En diciembre 31, mientras todos celebraban el año nuevo, Fuerza de ventas, la empresa detrás del desarrollo del Slack corporativo…
Information security specialists disclosed details of five vulnerabilities in D-Link routers
Los expertos de Loginsoft han informado sobre cinco vulnerabilidades graves encontradas en…
Steve Wozniak Sues YouTube Over Cryptocurrency Scammers
Steve Wozniak and more than ten other plaintiffs have sued…
DeepSource Developers Talked about Hacking of Their GitHub Application
Una popular herramienta de análisis de código automatizado, fuente profunda, is designed to…
Prometei botnet uses SMB for distribution
Cisco Talos ha descubierto una nueva botnet, prometei, que era…
Google cloud services are used for phishing
Atacantes, cuyo objetivo principal es robar varias credenciales, son…
REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider
Fin de semana pasado, uno de los proveedores de internet más grandes de Argentina, Telecomunicaciones Argentina,…
BadPower attack can set devices on fire
Expertos chinos del laboratorio Xuanwu (brazo de investigación de Tencent) have…
BlackRock Trojan steals passwords and card data from 337 applications on Android OS
Researchers from ThreatFabric have published a report on the study…
For RECON vulnerability appeared PoC exploit
A principios de esta semana, it became known that SAP engineers fixed…
On July «Patch Tuesday», only Microsoft fixed 123 vulnerabilities
As part of the July update Tuesday, Microsoft engineers fixed…
Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code
Más recientemente, we talked that the IT community has also…
NightLion hacker claims to have hacked DataViper information security company
A hacker, hiding under the pseudonym NightLion, claims that has…