Noticias, Consejos, Laboratorio de seguridad

3AM Ransomware Used As A Fallback For LockBit

3AM Ransomware Backs Up LockBit In Cyberattacks

Investigadores de ciberseguridad han descubierto una nueva familia de ransomware llamada 3AM. Attackers attempted to use it as an alternative attack

What Is Identity Theft & How to Protect Against It

El robo de identidad es un problema importante que afecta a millones de personas cada año., ya sea a través de información de tarjetas de crédito robadas o cuentas fraudulentas. It’s a

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Google lanzó una actualización de seguridad urgente para su navegador Chrome. The patch contains the fix for CVE-2023-4863, a heap buffer

Spyware in Fake Telegram Apps Infected Over 10 million Users

Es importante tener cuidado al utilizar mods de Messenger.. There have been reports of spyware disguised as modified versions

Mirai variant «Pandora» infects Android TV for DDoS attacks.

Detectada una nueva variante de la botnet del malware Mirai, Infectando decodificadores de TV Android de bajo costo. They are extensively

Fake app for DDoS attacks

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Grupo de análisis de amenazas de Google (ETIQUETA) specialists reported that the Russian-speaking

CloudMensis Malware for macOS

CloudMensis Malware Attacks MacOS Users

Los expertos de ESET han descubierto el malware CloudMensis, which is used

Phishing

«Your Account Has Been Locked»: Top 5 Signs of a Phishing Scam

The topic of our article will be how to understand

phishing kit targeting PayPal

Cybersecurity Researchers Discovered a New Phishing Kit targeting PayPal Users

Akamai has identified a new phishing kit that is being

DDoS Booter & IP Stresser

DDoS Booter & IP Stresser

The toolkit of cybersecurity specialists in companies does not consist

Email Spoofing

How to Prevent Email Spoofing in 2022

Email Spoofing Email spoofing or spoofing email is the forgery

SASE

SASE vs Zero Trust – What is Best?

A medida que la tecnología evoluciona, Los piratas informáticos se vuelven cada vez más sofisticados., remote working has

PoC exploit for macOS

Microsoft Releases PoC Exploit to Escape MacOS Sandbox

Microsoft has detailed a recently patched vulnerability affecting Apple operating

5 Security Mistakes You're Making On Social Media

5 Security Mistakes You’re Making On Social Media

Leading digital life on various social media platforms can sometimes

DDoS Attacks

DDoS Attacks: 6 Tried-and-Tested Methods How to Prevent It

Ataques DDoS: 6 Tried-and-Tested Methods How to Prevent It Before

Disk Usage Windows 10

100% Disk Usage Windows 10: How to Fix Disk Issue

100% disk usage is a widespread problem among Windows users

U2K Ransomware Strikes, Thousands Of Victims

U2K Ransomware Strikes, Thousands Of Victims

ransomware U2K, probablemente la estrella en ascenso en el campo del ransomware,…