Noticias, Consejos, Laboratorio de seguridad
What are Facebook Job Scams and How to Avoid Them?
Facebook es probablemente la red social más utilizada a nivel mundial. Desgraciadamente, it has also become a hub for scammers to…
New Google Chrome 0-day Vulnerability Exploited, Update Now
En las notas de la versión más reciente, Google reports about a new 0-day vulnerability that is already exploited in the wild.…
Novice FBot Stealer Targets Cloud Services
Los investigadores informan sobre una nueva cepa de malware denominada FBot. This Python-based malicious program appears to be a unique tool in…
AzorUlt Stealer Is Back In Action, Uses Email Phishing
Los expertos en ciberseguridad se han topado con el malware Azorult de ocho años. Este malware roba información y recopila datos confidenciales, and has been…
Remcos RAT Targets South Korean Users Through Webhards
An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users…
Microsoft Edge Exposes Bing API Addresses of Attended Sites
Users have noticed that a bug seems to have crept…
Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut
Microsoft has linked recent attacks on PaperCut servers to ransomware…
PaperCut Vulnerability Allows RCE, Exploited in the Wild
corte de papel, una solución de software utilizada para la gestión de impresión, parece que…
New SLP Vulnerability Allows 2200x DDoS Amplification
Una vulnerabilidad recientemente descubierta en SLP, un protocolo de red heredado, poder…
Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks
An investigation into a supply chain attack that hit 3CX…
Capita Hacked, Black Basta Gang Publishes Data
capitana, una empresa de subcontratación de procesos comerciales internacionales con sede en Londres, fue hackeado…
Medusa Groups Claims That It «Merged» the Source Code of Bing and Cortana into the Network
Medusa extortionist group claims to have published internal materials stolen…
Chinese Hackers Use Google Command & Control Capabilities in Attacks
Los expertos de Google han advertido que los chinos «gobierno» hackear grupo…
5 Signs That You’ve Fallen Victim to a Scam
El fraude en Internet es cada vez más extendido y sofisticado. From simple…
Legion Hacker Tool Used to Steal Data from Poorly Protected Websites
Experts have discovered a Python-based Legion hacking tool that is…
LockBit Releases World’s First macOS Ransomware
BloquearBit, an infamous ransomware gang that became a major threat…
Domino Backdoor is Lead by FIN7 and Conti Actors
Un nuevo Domino Backdoor apareció a principios de…