Noticias, Consejos, Laboratorio de seguridad
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Los atacantes apuntaron a instituciones financieras, sitios de reserva, and instant…
Infostealers: How to Detect, Remove and Prevent them?
El flujo de información es crucial en el mundo actual, pero también es valioso para los ciberdelincuentes. They target personal data stored…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) en el módulo Ubuntu OverlayFS. Estas vulnerabilidades…
Google Is Working on an Information Security Project Called Web Integrity API
Un equipo de cuatro ingenieros de Google está trabajando en un nuevo proyecto llamado Web Environment Integrity API, which will…
Internet Explorer shutdown. The Epithaf
En Junio 15, Microsoft will finally end support for Internet…
Team Xecuter’s life. How hackers leave after the arrest?
Gary Bowser, el hacker de nintendo, appears to be a very…
Companies Manage to Bargain With Ransomware Racketeers
Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (el…
The US Department of Justice Reports a Russian Botnet Dismantled
RSOCKS Russian Botnet Is No More as a Result of…
10 Types of Cyber Security Attacks in IoT
En un mundo donde el progreso de la información se está desarrollando rápidamente, él…
Microsoft Fixed Follina Vulnerability and 55 Other Bugs
Como parte del martes de parches de junio, Microsoft finally fixed…
Penetration Testing: Stages and Methods
¿Qué es la prueba de penetración?? Penetration testing is a method by…
Around 2000 People Arrested by Interpol for Internet Scams
Operación «Primera luz» La guerra contra el cibercrimen continúa. Como…
VPN, Proxy, or Tor: Differences, Meaning
Probablemente hayas escuchado las palabras VPN, Apoderado, y tor. Tú…
BlackCat ransomware gang publishes leaked data on the clear web site
BlackCat/ALPHV group recently announced on its victim shaming and extortion…
War in Ukraine triggered a Stream of amateurish ransomware
Russia has provoked hackers around the world to focus their…
Difference Between Polymorphic and Metamorphic Viruses
Malware polimórfico y metamórfico: the Comparison In this article, nosotros…