Noticias, Consejos, Laboratorio de seguridad

Decoy Dog Malware is Used for Infrastructure Attacks

Decoy Dog Malware Uncovered: Next-Gen Spyware

Un grupo de piratas informáticos, presumiblemente patrocinado por el estado, está desarrollando activamente y comenzando a utilizar un sofisticado kit de herramientas para Decoy Dog. Tiene…

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots. Los ciberdelincuentes también se han sumado a la pelea. Recent reports indicate that

Google Creates a Red Team to Attack AI Systems

Google dice que está creando un equipo rojo que se especializará en «Ataques técnicos sofisticados a sistemas de IA.» Among examples

Information Security Threats in Social Media

Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its

Ivanti 0-day exploited to target Norwegian government

Empresa de desarrollo de software Ivanti (anteriormente MobileIron Core) has patched a zero-day vulnerability that allowed authentication bypass. This vulnerability had a

The US Will Introduce A Cyber Army Into Its Military Units

The US Will Introduce A Cyber Army Into Its Military Units

Por 2030 the US plans to double the size of

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

A raíz del aumento de las tensiones entre Israel e Irán,…

DNS Attacks

TOP DNS Attacks Types

¿Qué es un DNS? (Servidor de nombres de dominio) Ataque? A DNS

AI gained consciousness

Google Is Trying to Get Rid of the Engineer Who Suggested that AI Gained Consciousness

Blake Lemoine, a senior software engineer at Google’s Responsible AI

BlackCat Ransomware Attacks Italian University

BlackCat Ransomware Attacks Italian University

BlackCat afectó a una universidad italiana esta semana. El…

new NFC key for Tesla

A Bug in the System Allows Adding a new NFC Key for a Tesla Car

Austrian researcher Martin Herfurt has demonstrated a new way to

Difference Between Phishing and Pharming

Difference Between Phishing and Pharming

Intruders try to keep up with the development in the

Smishing And Vishing

Smishing And Vishing: Differences To Know About Phishing Attacks

You can say it has become much easier for various

IPv4 vs IPv6

IPv4 vs IPv6: What’s the Difference?

¿Qué es IPv4 e IPv6?? IP addresses allow computers and

Fake Hacking

Tips For You To Recognize Fake Hacking

Fake hacking is a provocation or hacking that presupposes and

Qbot and the Follina vulnerability

Trojan Qbot Took Advantage of the Famous Follina Vulnerability

The researchers warned that the Qbot malware is already exploiting

Password Manager

Is It Safe to Use a Password Manager in 2022?

¿Cuál es la idea detrás de los administradores de contraseñas?? En el mundo de la ciberseguridad,…