Noticias, Consejos, Laboratorio de seguridad

Phobos Ransomware Mimics VX-Underground

Phobos Ransomware Mimics VX-Underground Researchers

Una nueva versión del ransomware Phobos afirma ser desarrollada por VX-Underground, una comunidad para compartir información sobre malware. Hackers again disguise

Welltok Data Breach Exposes More Than 8 million Patients

bientok, un software sanitario como servicio (SaaS) proveedor, ha informado de un acceso no autorizado a su servidor MOVEit Transfer, impacting the

LitterDrifter – Russia’s USB Worm Targeting Ukrainian Entities

Gusano USB LitterDrifter, Intrincadamente vinculado al notorio grupo Gamaredon y originario de Rusia.. It has set its sights on

Apache ActiveMQ Vulnerability Exploited In The Wild

Vulnerabilidad reciente de Apache ActiveMQ, que permite la ejecución remota de código, supuestamente se explota en ataques del mundo real. Analysts noticed several exploitation

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, apuntando a la colaboración Zimbra. Este es un script entre sitios (XSS) vulnerability exploited

vulnerability in Apache Commons Text

New Vulnerability in Apache Commons Text Is Already Being Attacked by Hackers

Según la firma de seguridad de WordPress Defiant, attempts have already been

McAfee email scam - is it dangerous?

What Is McAfee Scam Email? Tips for Protection from McAfee Email Scam in 2023

Fake McAfee email scam is a dangerous form of phishing

Ransom Cartel and REvil

Researchers Linked Ransom Cartel members to Famous Hack Group REvil

Experts from the Palo Alto Network analysed the Ransom Cartel

"Safari Can’t Establish a Secure Connection" error may prevent you from accessing the sites

Safari Can’t Establish a Secure Connection Error

El «Safari no puede establecer una conexión segura» error message appears

New PowerShell Backdoor

New PowerShell Backdoor Masquerades as a Windows Update

Los expertos en ciberseguridad de SafeBreach han encontrado una nueva, previously undocumented

Weak block cipher

Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure

ConSeguro (anteriormente F-Secure Business) researchers claim that the content of

Spyware vs. Stalkerware: What's the difference?

Spyware vs. Stalkerware: What’s the difference?

Los estafadores desarrollan diversos métodos para penetrar la propiedad ajena,…

DeadBolt decryption keys

Police Swindle Decryption Keys from DeadBolt Ransomware Gang

La policía nacional holandesa, together with information security specialists from

What is Torrenting?Is it illegal and Safe? How Does it Work

What is Torrenting? Is it illegal or Safe? How Does it Work

A torrent is a tool for free data exchange on

DDOSIA pays volunteers

Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies

Los expertos de Radware descubrieron el proyecto DDoS de crowdsourcing DDOSIA, en el cual…

0-day in Microsoft Exchange

Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It

Although Microsoft still hasn’t fixed the ProxyNotShell vulnerabilities found in

Instagram Bitcoin Scams: Beware of “Get Rich With Bitcoin” Instagram Scams

«Get Rich With Bitcoin» Instagram Bitcoin Scams

Instagram is a vast social network with over a billion