Noticias, Consejos, Laboratorio de seguridad

PUABundler:Win32/Fusioncore Removal Guide

PUABundler:Win32/FusionCore

PUABundler:Win32/FusionCore es una designación que utiliza Microsoft Defender Antivirus para detectar y eliminar programas potencialmente no deseados. (CACHORRO) that are spread

Trojan:Script/Sabsik.fl.A!ml Analysis & Removal Guide

Trojan:Guión/Sabsik.fl.A!ml es un nombre de detección genérico utilizado por Microsoft Defender. This name is particularly used to denote stealer malware that

ALPHV Ransomware Shut Down, Exit Scam Supposed

En marzo 5, 2024, El ransomware ALPHV/BlackCat reclamó su cierre, “debido a la toma del poder del FBI”. Despite the actions from law enforcement

Backdoor:Win32/Bladabindi!ml Analysis & Removal Guide

Backdoor:Win32/Bladabindi!ml es un nombre de detección genérico utilizado por Microsoft Defender. Se refiere específicamente a un malware de puerta trasera conocido como njRAT.,…

PUA:Win32/PCMechanic – PC Mechanic Plus Removal Guide

PUA:Win32/PCMechanic es una detección asociada con la aplicación potencialmente no deseada. This pseudo system optimizer claims that the user’s system has

Decoy Dog Malware is Used for Infrastructure Attacks

Decoy Dog Malware Uncovered: Next-Gen Spyware

Un grupo de piratas informáticos, presumiblemente patrocinado por el estado, is actively developing and

FraudGPT Founds Application in Phishing Emails

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots.

Google creates a red team

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will

Social Media Threaten Information Security

Information Security Threats in Social Media

Social media has become an important aspect of our everyday

Ivanti EPMM 0-day Vulnerability

Ivanti 0-day exploited to target Norwegian government

Empresa de desarrollo de software Ivanti (anteriormente MobileIron Core) has patched a

Microsoft Crypto Wallet Scam Spreads Luca Stealer

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

Con el número cada vez mayor de amenazas cibernéticas, hackers and cybersecurity

pirated software and HotRat

Trojan HotRat Is Distributed through Pirated Versions of Software and Games

Avast experts have warned that a new variant of AsyncRAT

Malvertising spreading Gozi and IcedID Trojans

Gozi and IcedID Trojans Spread via Malvertising

Malvertising on Google Search is an unpleasant occurrence where malicious

WooCommerce Payments WordPress Plugin

Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites

Hackers use a vulnerability in the widely used WooCommerce Payments

AI Scam Gallops in Facebook Ads

Fake Ads on Facebook Promote Scam AI Services

Facebook has been hit by a wave of fake ads

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8, un infame grupo de ciberdelincuentes, has updated its backdoor