Noticias, Consejos, Laboratorio de seguridad

Mandiant's Account in X Hacked

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been hacked to promote a cryptocurrency scam. It happens along with

Qualcomm RCE Vulnerabilities Expose Millions of Users

Una vulnerabilidad en varios chipsets de Qualcomm permite la ejecución remota de código durante la llamada telefónica. Esta y otras vulnerabilidades fueron descubiertas…

Black Basta Ransomware Free Decryptor Available

Los investigadores de SRLabs publicaron un descifrador gratuito para el ransomware BlackBasta. Descubrieron la vulnerabilidad en la forma en que el malware maneja el cifrado…

Seven Common Types of Malware – Analysis & Description

En el intrincado panorama de la ciberseguridad, comprender las diversas formas de malware es crucial. Este artículo ofrece una mirada en profundidad.…

DLL Search Order Hijacking Technique Bypasses Protection

Una nueva DLL (Biblioteca de enlaces dinámicos) Surgió la variante de secuestro de órdenes de búsqueda. Este método aprovecha los ejecutables en el WinSxS confiable.…

What is ImBetter malware?

ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

Hoy, Los sitios de phishing son comunes.. Pero desafortunadamente, esto aparentemente viejo,…

Bing chatbot scammer

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded

Blue Screen of Death Scams

Fake BSOD Scams Target Users Visiting Fake Adult Sites

The blue screen of death is probably the most unpleasant

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach

СhatGPT Became a Source of Phishing

СhatGPT Became a Source of Phishing

A medida que el mundo digital continúa evolucionando, so do the

BlackLotus UEFI Bootkit

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

Los expertos de ESET informaron que el kit de arranque BlackLotus UEFI, cual es…

What is Beep Malware?

New stealthy «Beep» malware focuses heavily on evading detection

Los ciberdelincuentes desarrollan periódicamente algo nuevo. Sometimes it is an updated

LastPass Breach Is Bigger Than It Was Expected

LastPass Breach Investigation Goes On, Things are Even Worse

Ultimo pase, propiedad de ir a (anteriormente LogMeIn) and with over 30

YouTube and Pixel smartphones

YouTube Video Causes Pixel Smartphones to Reboot

Users have found that Pixel smartphones powered by Google Tensor

imitating a voice with AI

The Researcher Hacked His Own Bank Account by Imitating a Voice with AI

The journalist Vice Motherboard Joseph Cox hacked the bank account

New Methods of QakBot Spyware Distribution

Qakbot Malware Applies New Distribution Methods

Today there is an arms race between cybercriminals and antimalware

heads of cybersecurity departments

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

Según un nuevo informe de Gartner, por 2025, cerca de…