Noticias, Consejos, Laboratorio de seguridad
Tortilla (Babuk) Ransomware Decryptor Available
En enero 9, 2024, Avast and Cisco Talos announced the release of a free decryptor for one of the Babuk…
OAuth2 Session Hijack Vulnerability: Details Uncovered
El actor de amenazas Prisma descubrió un sofisticado exploit dirigido al sistema de autenticación OAuth2 de Google.. This exploit leverages undocumented functionalities within…
xDedic Marketplace Members Detained In International Operations
El infame mercado xDedic, known for its illicit trade in compromised computers and personal data, ha sido efectivamente desmantelado. 19…
Verified X/Twitter Accounts Hacked to Spread Cryptoscams
The trend of hacking official accounts to promote cryptocurrency fraud is gaining momentum. Durante la semana pasada, Los investigadores han descubierto…
SMTP Smuggling is a New Threat to Email Security
A new SMTP Smuggling technique reportedly has the potential to bypass existing security protocols. Also it can enable attackers to…
Financial Assistance Department Email Scam to call (855)-XXX-XXXX
Email is one of the oldest ways to exchange information…
BreachForums is down. Things got worse?
Recientemente, one of BreachForums administrators nicknamed PomPomPurin was arrested by…
5 Tips to Improve Your Privacy on the Web
Hoy en día, online privacy is a crucial concern that we should…
GPT-4 Tricked a Person into Solving a CAPTCHA for Them by Pretending to Be Visually Impaired
Antes del lanzamiento de GPT-4 a principios de esta semana, el…
New Microsoft SmartScreen Bypass Technique Causes Concerns
Microsoft SmartScreen proved to be an effective way of approving…
The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion
Centro de denuncias de fraude en Internet del FBI (IC3) has released its…
North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn
Mandiant experts noticed that North Korean hackers have focused their…
Incoming Silicon Valley Bank Related Scams
Los eventos alucinantes a escala mundial siempre atraen mucha atención. Creadores de noticias,…
Mobile Malware Threat Landscape — 2022 Summary
Hoy, a smartphone is much more than just a way…
Emotet Has Resumed Activity after a Three-Month Break
Experts noticed that this week Emotet resumed its activity and…
Acronis Breached, Internal Data Leaked
acronis, a Swiss-based information technology company that provides file recovery…
Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word
A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…