Noticias, Consejos, Laboratorio de seguridad

New Ivanti EPMM 0-day Vulnerability

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Los atacantes apuntaron a instituciones financieras, sitios de reserva, and instant

Infostealers: How to Detect, Remove and Prevent them?

El flujo de información es crucial en el mundo actual, pero también es valioso para los ciberdelincuentes. They target personal data stored

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) en el módulo Ubuntu OverlayFS. Estas vulnerabilidades…

Google Is Working on an Information Security Project Called Web Integrity API

Un equipo de cuatro ingenieros de Google está trabajando en un nuevo proyecto llamado Web Environment Integrity API, which will

Internet Explorer shutdown. The Epithaf

Internet Explorer shutdown. The Epithaf

En Junio 15, Microsoft will finally end support for Internet

Cybercriminals' life under arrest. How does it go?

Team Xecuter’s life. How hackers leave after the arrest?

Gary Bowser, el hacker de nintendo, appears to be a very

Ransom Extortion

Companies Manage to Bargain With Ransomware Racketeers

Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (el…

DOJ

The US Department of Justice Reports a Russian Botnet Dismantled

RSOCKS Russian Botnet Is No More as a Result of

Types of Cyber Security Attacks in IoT

10 Types of Cyber Security Attacks in IoT

En un mundo donde el progreso de la información se está desarrollando rápidamente, él…

Microsoft fixes Follina vulnerability

Microsoft Fixed Follina Vulnerability and 55 Other Bugs

Como parte del martes de parches de junio, Microsoft finally fixed

penetration testing

Penetration Testing: Stages and Methods

¿Qué es la prueba de penetración?? Penetration testing is a method by

Interpol Operatives

Around 2000 People Arrested by Interpol for Internet Scams

Operación «Primera luz» La guerra contra el cibercrimen continúa. Como…

VPN, Proxy, or Tor

VPN, Proxy, or Tor: Differences, Meaning

Probablemente hayas escuchado las palabras VPN, Apoderado, y tor. Tú…

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat/ALPHV group recently announced on its victim shaming and extortion

War in Ukraine triggered a Stream of amateurish ransomware

War in Ukraine triggered a Stream of amateurish ransomware

Russia has provoked hackers around the world to focus their

Difference Between Polymorphic and Metamorphic Viruses

Difference Between Polymorphic and Metamorphic Viruses

Malware polimórfico y metamórfico: the Comparison In this article, nosotros…