Noticias, Consejos, Laboratorio de seguridad

Broom Cleaner Analysis and Removal

Broom Cleaner App (Virus Removal)

Broom Cleaner is an unwanted program that at first glance seems to be a safe tool for cleaning and optimizing

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that allow attackers to exploit Kubernetes workloads for crypto

MITRE NERVE Hacked, Service Taken Offline

MITRE informa sobre actividad de piratas informáticos en su red NERVE, visto en abril 2024. Al detectar la actividad sospechosa, the organization

RegAsm.exe

El proceso RegAsm.exe es un componente importante del sistema operativo Windows asociado con .NET Framework. Esta utilidad es…

LabHost Phishing Service Taken Down by Police

Las autoridades han incautado el servicio de phishing LabHost, acusado de robar información personal de víctimas en todo el mundo. Este servicio se especializa en crear…

Critical Auth Bypass Vulnerability in Apache OFBiz: CVE-2023-5146в

Apache OFBiz Vulnerability Exposes Millions of Systems

The cyber world has been rattled by the recent discovery

YouTube Videos Promoting Malware

YouTube Videos Promote Software Cracks With Lumma Stealer

Researchers have discovered a cybersecurity threat that targets users through

Adobe ColdFusion Vulnerabilities Exploited in the Wild

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks,…

Tortilla Ransomware Free Decryptor Available

Tortilla (Babuk) Ransomware Decryptor Available

En enero 9, 2024, Avast and Cisco Talos announced the

OAuth2 Vulnerability Allows for Persistent Session Hijacking

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered

xDedic Actors Have Been Apprehended After a Five-year Hunt

xDedic Marketplace Members Detained In International Operations

El infame mercado xDedic, known for its illicit trade in

X/Twitter Crypto Scams From Verified Accounts

Verified X/Twitter Accounts Hacked to Spread Cryptoscams

The trend of hacking official accounts to promote cryptocurrency fraud

SMTP Smuggling - Global Email Security Threat

SMTP Smuggling is a New Threat to Email Security

Según se informa, una nueva técnica de contrabando SMTP tiene el potencial de…

Mandiant's Account in X Hacked

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been

RCE Vulnerability In Qualcomm Chips Exposes Millions

Qualcomm RCE Vulnerabilities Expose Millions of Users

Vulnerability in several Qualcomm chipsets allows for remote code execution

SRLabs Releases Free Black Basta Ransomware Decryptor

Black Basta Ransomware Free Decryptor Available

Los investigadores de SRLabs publicaron un descifrador gratuito para el ransomware BlackBasta. Ellos…

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

En el intrincado panorama de la ciberseguridad, comprehending the various forms