Noticias, Consejos, Laboratorio de seguridad

What is Facebook Job Scam?

What are Facebook Job Scams and How to Avoid Them?

Facebook es probablemente la red social más utilizada a nivel mundial. Desgraciadamente, it has also become a hub for scammers to

New Google Chrome 0-day Vulnerability Exploited, Update Now

En las notas de la versión más reciente, Google reports about a new 0-day vulnerability that is already exploited in the wild.

Novice FBot Stealer Targets Cloud Services

Los investigadores informan sobre una nueva cepa de malware denominada FBot. This Python-based malicious program appears to be a unique tool in

AzorUlt Stealer Is Back In Action, Uses Email Phishing

Los expertos en ciberseguridad se han topado con el malware Azorult de ocho años. Este malware roba información y recopila datos confidenciales, and has been

Remcos RAT Targets South Korean Users Through Webhards

An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users

Microsoft Edge and Bing

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept

Clop LockBit and PaperCut

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

corte de papel, una solución de software utilizada para la gestión de impresión, parece que…

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

Una vulnerabilidad recientemente descubierta en SLP, un protocolo de red heredado, poder…

supply chain attack 3CX

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX

Capita Hacked by Black Basta Ransomware Gang

Capita Hacked, Black Basta Gang Publishes Data

capitana, una empresa de subcontratación de procesos comerciales internacionales con sede en Londres, fue hackeado…

Medusa, Bing and Cortana

Medusa Groups Claims That It «Merged» the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Los expertos de Google han advertido que los chinos «gobierno» hackear grupo…

5 Signs That You've Fallen Victim to a Scam

5 Signs That You’ve Fallen Victim to a Scam

El fraude en Internet es cada vez más extendido y sofisticado. From simple

Legion hacker tool

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is

LockBit Released its Ransomware for macOS

LockBit Releases World’s First macOS Ransomware

BloquearBit, an infamous ransomware gang that became a major threat

Domino Uses Parts of Lizar Malware, Delivered by Dave Loader

Domino Backdoor is Lead by FIN7 and Conti Actors

Un nuevo Domino Backdoor apareció a principios de…