Noticias, Consejos, Laboratorio de seguridad
Phobos Ransomware Mimics VX-Underground Researchers
Una nueva versión del ransomware Phobos afirma ser desarrollada por VX-Underground, una comunidad para compartir información sobre malware. Hackers again disguise…
Welltok Data Breach Exposes More Than 8 million Patients
bientok, un software sanitario como servicio (SaaS) proveedor, ha informado de un acceso no autorizado a su servidor MOVEit Transfer, impacting the…
LitterDrifter – Russia’s USB Worm Targeting Ukrainian Entities
Gusano USB LitterDrifter, Intrincadamente vinculado al notorio grupo Gamaredon y originario de Rusia.. It has set its sights on…
Apache ActiveMQ Vulnerability Exploited In The Wild
Vulnerabilidad reciente de Apache ActiveMQ, que permite la ejecución remota de código, supuestamente se explota en ataques del mundo real. Analysts noticed several exploitation…
Zimbra Vulnerability Exploited in the Wild
Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, apuntando a la colaboración Zimbra. Este es un script entre sitios (XSS) vulnerability exploited…
New Vulnerability in Apache Commons Text Is Already Being Attacked by Hackers
Según la firma de seguridad de WordPress Defiant, attempts have already been…
What Is McAfee Scam Email? Tips for Protection from McAfee Email Scam in 2023
Fake McAfee email scam is a dangerous form of phishing…
Researchers Linked Ransom Cartel members to Famous Hack Group REvil
Experts from the Palo Alto Network analysed the Ransom Cartel…
Safari Can’t Establish a Secure Connection Error
El «Safari no puede establecer una conexión segura» error message appears…
New PowerShell Backdoor Masquerades as a Windows Update
Los expertos en ciberseguridad de SafeBreach han encontrado una nueva, previously undocumented…
Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure
ConSeguro (anteriormente F-Secure Business) researchers claim that the content of…
Spyware vs. Stalkerware: What’s the difference?
Los estafadores desarrollan diversos métodos para penetrar la propiedad ajena,…
Police Swindle Decryption Keys from DeadBolt Ransomware Gang
La policía nacional holandesa, together with information security specialists from…
What is Torrenting? Is it illegal or Safe? How Does it Work
A torrent is a tool for free data exchange on…
Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies
Los expertos de Radware descubrieron el proyecto DDoS de crowdsourcing DDOSIA, en el cual…
Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It
Although Microsoft still hasn’t fixed the ProxyNotShell vulnerabilities found in…
«Get Rich With Bitcoin» Instagram Bitcoin Scams
Instagram is a vast social network with over a billion…