Noticias, Consejos, Laboratorio de seguridad
Windows 7 Extended Security Update Program cancelled
En enero 8, 2023, Microsoft anunció la cancelación del programa ESU para Windows 7. La versión del sistema operativo lanzada…
Web Application Firewall: Difference Blocklist and Allowlist WAFs
Es posible que te hayas encontrado con un firewall de aplicaciones web (WAF) concepto pero todavía tengo que pensarlo mucho. Sin embargo,…
Dangerous Virus & Malware Threats in 2023
Las amenazas de virus y malware evolucionan constantemente y se vuelven más sofisticadas y peligrosas con el tiempo.; esto lo hace extremadamente…
Security Breach
Una brecha de seguridad es un acceso no autorizado a un dispositivo, red, programa, o datos. Security breaches result from the network…
Android Devices Can Be Monitored Using Motion Sensors
A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop…
Analysts say that over 5 billion unique credentials can be found on the black market
Analysts at Digital Shadows have estimated that there are currently…
Google Unveiled a Source Code for Tsunami Vulnerability Scanner
Google has unveiled the source code for the Tsunami scanner,…
Mozilla suspended Firefox Send service due to abuse and malware
Journalists from ZDNet drew attention of Mozilla engineers to numerous…
Scientists have introduced a new algorithm for protection against deepfakes
Scientists from Boston University have introduced a new algorithm for…
Google vice president says «black hat» is not a neutral term
Journalists from ZDNet noticed that during the weekend there was…
Attackers hack Roblox accounts and urge to vote for Trump
Según la publicación ZDNet, unknown attackers hack Roblox accounts…
The researcher found that every 142nd password is “123456”
Ata Hakçıl, un estudiante turco e investigador independiente, has done…
US cyber command warned about dangerous vulnerability in PAN-OS
The US cyber command warned that in PAN-OS was discovered…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the…
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer…
Evil Corp returns to criminal activity with WastedLocker ransomware
Fox-IT experts talked about the latest activity of the famous…
Hackers force users to solve CAPTCHA
Microsoft analysts have discovered a malicious campaign, in which hackers…