Noticias, Consejos, Laboratorio de seguridad

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8, un infame grupo de ciberdelincuentes, ha actualizado su malware de puerta trasera para evitar ser detectado. They made improvements and prepared

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix pudo parchear una vulnerabilidad de día cero, while Adobe warns of attacks using ColdFusion Zero-Day and releases an urgent

Trojanized TeamViewer Installer Spreads njRAT

Según los informes, los actores de amenazas comenzaron a utilizar TeamViewer falso para distribuir malware. Their particular favourite for the final payload is the infamous

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

Un empleado de la plataforma VirusTotal, propiedad de Google, subió accidentalmente un archivo con los nombres, email addresses and other data of

Meduza Stealer: What Is It & How Does It Work?

El mundo del Malware evoluciona constantemente, y sería imprudente ignorar a los recién llegados y su potencial. Meduza Stealer appears to

Evil Corp switched to LockBit

Evil Corp Switched to Using LockBit Malware to Avoid Sanctions

The Evil Corp group switched to using the LockBit ransomware

Warning Signs Of DDoS Attack: Symptoms

Warning Signs Of DDoS Attack: Symptoms

DDoS attacks can sometimes have devastating effects on various internet

Extension spoofing strikes Spanish-speaking countries

Extension spoofing strikes Spanish-speaking countries

An old-good form of malware disguisment sparked recently in several

Types of SQL Injection: Attack Examples

Types of SQL Injection: Attack Examples

Como escribimos en uno de los artículos., SQL is

malware vs ransomware

Malware VS Ransomware: What’s the Difference?

To deal with any problem successfully you should first have

password attacks

TOP 7 Types of Password Attacks

¿Qué es un ataque de contraseña?? Al principio, you probably

UNISOC vulnerability

Critical Vulnerability in UNISOC Devices Patched

UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In

0-day vulnerability in Windows Search

Information Security Specialists Discovered a 0-day Vulnerability in Windows Search

A new 0-day Windows Search vulnerability could be used to

Clipminer

Clipminer – a Million Dollar Clipboard Hijacking Coinminer

Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been

YourCyanide Ransomware

CMD-Based Ransomware YourCyanide With Info-Stealing Functions

Nueva amenaza: YourCyanide Ransomware CMD-based ransomware YourCyanide, actualmente en desarrollo,…

Cyber Attacks

Most Common Cyber Attacks Today: Tips for Protection

Cyber attacks technologies have become more sophisticated and sophisticated in

Phishing vs Spoofing

Difference Between Phishing and Spoofing

¿Qué es un ataque de phishing?? Phishing is a cyber-attack method