Noticias, Consejos, Laboratorio de seguridad
Remote Access Trojan (RAT Malware)
El troyano de acceso remoto es un software que permite el acceso no autorizado a la computadora de la víctima o vigilancia encubierta.. Los troyanos de acceso remoto son…
Top famous Ransomware hack groups in 2022
Echemos un vistazo a los chicos malos de este año.. Durante 2022, las facciones se han ido formando y formando…
Hackers Stole Data from the LastPass Use Password Vault
LastPass password manager developers have reported that hackers who recently broke into the company’s cloud storage have accessed it and…
Texting Spam: How to Stop Spam Text Messages
¿Qué significa spam en los mensajes de texto?? Recibir mensajes de texto aleatorios de números desconocidos es inquietante. Pero, desafortunadamente, spam is more…
Difference Between IPSec and SSL
En los últimos años, El trabajo remoto se ha convertido en una parte integral del panorama empresarial mundial.. Sin embargo, to make remote…
Cybercriminals attacked UCSF, US leading COVID-19 vaccine developer
Usando ransomware, Los ciberdelincuentes atacaron la Universidad de California, San Francisco…
Users seldom change passwords even after data leaks
Investigadores de la Universidad Carnegie Mellon descubrieron que los usuarios rara vez cambian…
Vulnerability in Indian TikTok clone allows hacking user profiles
The Hacker News reports that Indian security specialist Rahul Kankral…
Octopus Scanner Malware Found On GitHub
GitHub developers have issued a warning about the appearance of…
Valak malware steals corporate data using Microsoft Exchange servers
Cyberreason Nocturnus experts said that the Valak bootloader discovered in…
Experts confirm data leak of 26 million LiveJournal users
a mediados de mayo 2020, in the Telegram channel of the head…
Hackers use Discord as a tool for stealing passwords
The Bleeping Computer magazine warns that the new version of…
Sarwent malware opens RDP ports on infected machines
SentinelOne experts noticed that the new version of the Sarwent…
Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic
As part of the fight against the spread of coronavirus…
GitLab checked its employees: on phishing got every fifth
Recientemente, the GitLab platform conducted a security audit, analyzing if…
Avast experts accidentally got source code for GhostDNS exploit
Avast analysts suddenly got the source codes for the GhostDNS…
ZDI experts described five 0-day vulnerabilities in Windows
Researchers from the Trend Micro Zero Day Initiative (PARECE) equipo…