Noticias, Consejos, Laboratorio de seguridad

What is Trojan:Script/Ulthar.A!ml?

Trojan:Script/Ulthar.A!ml

Trojan:Script/Ulthar.A!ml es una detección de Windows Defender que se identifica como troyano. It specifically refers to a script-based malicious program.

rsEngineSvc.exe Process: Reason Core Security Engine Service

RsEngineSvc.exe es un archivo ejecutable asociado con RAV Antivirus, un programa desarrollado por ReasonLabs. Aunque es menos peligroso que el malware,…

Bitfiat Process High CPU – Explained & Removal Guide

Bitfiat es un minero de monedas malicioso que explota el hardware de tu computadora para extraer criptomonedas. Such malware takes as much resources

Misleading:Win32/Lodi

Engañoso:Win32/Lodi es la detección de software potencialmente peligroso de Microsoft Defender. It makes misleading or deceptive claims about files, entradas de registro, o…

Trojan:Script/Phonzy.B!ml

Trojan:Script/Phonzy.B!ml es un nombre de detección genérico utilizado por Microsoft Defender. This type of malware is categorized as a loader as

Citrix and Adobe Patch 0-day Vulnerabilities

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix pudo parchear una vulnerabilidad de día cero, while Adobe

njRAT Hides in Trojanized TeamViewer Installers

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware.

Military and Intelligence Data Leak On VirusTotal

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a

Meduza Stealer Analysis in 2023

Meduza Stealer: What Is It & How Does It Work?

El mundo del Malware evoluciona constantemente, and it would be reckless

Hackers Employ WormGPT for Generating Phishing Emails

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in

US Military Emails Compromised Due to the Typos in Receiver Address

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up

Microsoft’s nOAuth Flaw Allows Email Spoofing

Microsoft «nOAuth» is Vulnerable to Simple Email Spoofing

En junio, investigadores revelaron una vulnerabilidad en Azure Active Directory…

American Airlines Hacked by Cl0p via MOVEit MFT Vulnerabilities

American Airlines Hacked by Cl0P Gang, MOVEit Involved

American Airlines, la principal compañía aérea de EE.UU., aparece…

Trojan:Win32/Randet.A!plock Microsoft Defender Detection

Trojan:Win32/Randet.A!plock – What is That Detection?

Detecciones masivas de troyanos por parte de Windows Defender:Win32/Randet.A!Plock preocupa a la gente. Are the

CVE-2023-36884 Microsoft Zero Day Vulnerability

Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild

En julio 11, 2023, Microsoft published an article about addressing

BlackLotus UEFI Bootkit

Researchers Found BlackLotus UEFI Bootkit Sources on GitHub

El código fuente del kit de arranque UEFI BlackLotus, que era…

What is cybersecurity risk?

What is Cyber Risk Exposure and How Can You Manage It?

Las empresas modernas se enfrentan diariamente a amenazas de ciberseguridad. While most are effectively