Noticias, Consejos, Laboratorio de seguridad

FBI and CUBA ransomware

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

El FBI y los EE.UU.. Agencia de Infraestructura y Seguridad Cibernética (CISA) informan que a partir de agosto 2022, Cuba ransomware operators

Cyber Spies Use USB Devices to Infect Targets

Los especialistas de Mandiant hablan de una inusual campaña de malware que afecta a objetivos en el Sudeste Asiático, when cyber spies use USB devices as

Spyware Attack: Red Flags You’re Dealing With Spyware

El software espía es probablemente uno de los tipos de malware más antiguos pero más peligrosos.. Como el nombre sugiere, spyware is software

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Muchos Dell, Los dispositivos HP y Lenovo utilizan versiones antiguas e inseguras de OpenSSL, como advierte Binarly. Déjame recordarte…

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge se convirtió en otro anfitrión para los actores de amenazas. Crooks found a way to spread the WASP information stealer

Hackers spoof DNS settings

Hackers spoof DNS settings to distribute fake coronavirus applications

Journalists from Bleeping Computer investigated that hackers are replacing DNS

exploit for Kr00k Wi-Fi vulnerability

Published exploit for Kr00k Wi-Fi vulnerability

En febrero 2020, especialistas en seguridad de la información hablaron en la RSA…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, en…

Firefox Refuses to Support FTP

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an

Ransomware attacks occur at night

Ransomware attacks most often occur at night and on weekends

Según un informe publicado por la empresa estadounidense FireEye,…

Snoop steals data from Intel processors

Snoop attack steals data from Intel processors

Servicios web de Amazon (AWS) software engineer Pawel Wieczorkiewicz discovered another

Microsoft stopped RDCMan development

Microsoft stopped RDCMan development due to a bug

Microsoft ha detenido el desarrollo del Administrador de conexión a Escritorio remoto…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recientemente, I wrote all about the vulnerabilities of Intel and

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

Según un estudio de Qué empresa, more than 40%