Noticias, Consejos, Laboratorio de seguridad
BianLian Exploits TeamCity Vulnerability to Deploy Backdoors
BianLian, a group of cybercriminals known for their ransomware attacks, Recientemente llamó la atención de la comunidad de seguridad de la información.. Por…
PUA:Win32/Softcnapp
Detección de PUA:Win32/Softcnapp de Microsoft Defender, asignado a un programa no deseado. It sometimes appears as a false positive of a…
Microsoft is Hacked, Again by Midnight Blizzard
Microsoft reconoce haber sido hackeado por segunda vez este año, por el mismo grupo patrocinado por el estado ruso Midnight Blizzard. La empresa…
Phantom Hacker Scams On The Rise, Target Elderly
Phantom hacker scams is a specific type of fraud that aims at convincing the victim to transfer the funds due…
WingsOfGod.dll – WogRAT Malware Analysis & Removal
WogRAT, también conocido como WingsOfGod RAT, es un troyano novato de acceso remoto que ataca a usuarios de países asiáticos. Named after…
Phishing With Hacked Sites Becomes a Massive Menace
Threat actors started using compromised websites for phishing purposes much…
Beware of Cryptocurrency Recovery Scams
Recientemente, the FBI reported increased scammers posing as companies offering…
Back to School Scams Expand As August Begins
A medida que se acerca la nueva temporada escolar, scammers target students and…
Ivanti EPMM Vulnerability Patch is Vulnerable
Ivanti, the provider of a wide range of management solutions…
Are .zip Domains Safe to Use and Visit?
Internet se ha convertido en nuestro segundo hogar. Every time we…
Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter’s transition to the new name…
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack…
Conti Members Are Back in Action as Part of Akira Ransomware
Los expertos investigan la actividad del grupo de ransomware Akira, cual…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google…
Infostealers: How to Detect, Remove and Prevent them?
El flujo de información es crucial en el mundo actual, pero…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation…