Noticias, Consejos, Laboratorio de seguridad
Decoy Dog Malware Uncovered: Next-Gen Spyware
Un grupo de piratas informáticos, presumiblemente patrocinado por el estado, está desarrollando activamente y comenzando a utilizar un sofisticado kit de herramientas para Decoy Dog. Tiene…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It’s not just IT companies racing to develop AI-powered chatbots. Los ciberdelincuentes también se han sumado a la pelea. Recent reports indicate that…
Google Creates a Red Team to Attack AI Systems
Google dice que está creando un equipo rojo que se especializará en «Ataques técnicos sofisticados a sistemas de IA.» Among examples…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its…
Ivanti 0-day exploited to target Norwegian government
Empresa de desarrollo de software Ivanti (anteriormente MobileIron Core) has patched a zero-day vulnerability that allowed authentication bypass. This vulnerability had a…
The US Will Introduce A Cyber Army Into Its Military Units
Por 2030 the US plans to double the size of…
Iranian Spear-Phishing Operation Targets US And Israeli High Executives
A raíz del aumento de las tensiones entre Israel e Irán,…
TOP DNS Attacks Types
¿Qué es un DNS? (Servidor de nombres de dominio) Ataque? A DNS…
Google Is Trying to Get Rid of the Engineer Who Suggested that AI Gained Consciousness
Blake Lemoine, a senior software engineer at Google’s Responsible AI…
BlackCat Ransomware Attacks Italian University
BlackCat afectó a una universidad italiana esta semana. El…
A Bug in the System Allows Adding a new NFC Key for a Tesla Car
Austrian researcher Martin Herfurt has demonstrated a new way to…
Difference Between Phishing and Pharming
Intruders try to keep up with the development in the…
Smishing And Vishing: Differences To Know About Phishing Attacks
You can say it has become much easier for various…
IPv4 vs IPv6: What’s the Difference?
¿Qué es IPv4 e IPv6?? IP addresses allow computers and…
Tips For You To Recognize Fake Hacking
Fake hacking is a provocation or hacking that presupposes and…
Trojan Qbot Took Advantage of the Famous Follina Vulnerability
The researchers warned that the Qbot malware is already exploiting…
Is It Safe to Use a Password Manager in 2022?
¿Cuál es la idea detrás de los administradores de contraseñas?? En el mundo de la ciberseguridad,…