Noticias, Consejos, Laboratorio de seguridad

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Investigadores de seguridad descubren vulnerabilidades críticas en los controladores de seguridad del software Panda Security. This chain of flaws abuses legitimate drivers to disable

What is a Bootkit? Explanation & Protection Guide

Bootkit es bastante inusual y tácito., aunque es un tipo de malware muy utilizado. These advanced malware types operate beneath the

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

Un nuevo ransomware llamado «Kaseika» uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kaseika…

GoAnywhere MFT Auth Bypass Vulnerability Discovered

La fiesta de vulnerabilidades en el software empresarial continúa con una falla de omisión de autenticación en GoAnywhere MFT de Fortra. Clasificado en CVSS…

Confluence RCE Vulnerability Under Massive Exploitation

Los investigadores ven intentos de explotar una vulnerabilidad crítica en servidores obsoletos de Atlassian Confluence. La falla permite a los atacantes ejecutar…

US Authorities Warn of Disaster-Related Scams

US Authorities Warn of Disaster-Related Scams

Después de desastres naturales y condiciones climáticas adversas, there is a higher

CAPTCHA in Discord and AI

CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI

Users complain that the Discord CAPTCHA provided by hCaptcha forces

GitLab Releases Patch to Critical Vulnerability

GitLab Releases Patch to Critical Vulnerability

GitLab, one of the most famous code repositories in the

Godaddy Refund Phishing Scam

GoDaddy Refund Phishing Emails Spread Infostealer

Hackers started using GoDaddy Refund Emails as a disguise to

Philadelphia Inquirer Falls Victim to Cuba Ransomware

Philadelphia Inquirer is Struck by Cuba Ransomware

El investigador de Filadelfia, Philadelphia’s largest newspaper by circulation and third-longest-running

FIN7 resumed activity

FIN7 Hack Group Resumed Activity, Linked to Clop Ransomware

Microsoft analysts report that last month the notorious hacker group

What is ChatGPT Fleeceware?

ChatGPT Causes New Wave of Fleeceware

La inteligencia artificial es uno de los avances más significativos en…

What is Oneetx.exe Process?

Oneetx.exe – What is that process? Oneetx Removal

Oneetx.exe es un proceso malicioso, related to Amadey dropper malware.

Python Package Index is Flooded with Malware

PyPI Malware Storm Forces to Suspend New Uploads

Índice de paquetes de Python, un repositorio de software para desarrolladores de Python, recientemente…

3 Less Popular Malware Spreading Ways

3 Unpopular Malware Spreading Ways in 2023

El espacio moderno de Internet es como un océano infinito, dónde…

What Ducktail malware and how to avoid it?

Ducktail Infostealer Malware Targeting Facebook Business Accounts

Los investigadores descubrieron el malware Ducktail, which targets individuals and organizations on

Malicious Plugins Were Detected on VSCode Marketplace

Visual Studio Code Malicious Plugins Steal Personal Data

Algunos complementos para Visual Studio Code, a popular code editing