Noticias, Consejos, Laboratorio de seguridad

Fake Driver Signatures Used to Inject Malware

Forged Driver Signatures Exploited In The Wild

Los piratas informáticos utilizan activamente la suplantación de firmas de controladores, que se origina en una laguna en el mecanismo de manejo de controladores en modo kernel de Windows. Ellos soportan mucho…

Legion Stealer targeting PUBG players

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise

MOVEit Transfer Fixes a New Critical Vulnerability

Luego de que cientos de empresas fueran atacadas con una vulnerabilidad de día 0 en MOVEit Transfer, the developer of this file transfer management

California Water Treatment Plant Is in the Hands of a Hacker

Rambler Gallo, un residente de Tracy, California, has been charged with maliciously damaging a computer after it allegedly infiltrated a

Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware

Wise Remote Stealer es un software potente y malicioso que funciona como un ladrón de información, Troyano de acceso remoto (RATA), robot DDoS,…

What is Adware?

TOP Facts About Adware Attacks To Be Reminded Today

Para empezar, each of you has faced this challenge.

Antivirus Advantages Of Using

Antivirus Is Important! Advantages Of Using

If you are one of those people who are contemplating

steal a Tesla car

Information Security Specialist Showed How to Steal a Tesla Car

Sultán Qasim Khan, un consultor de seguridad del Grupo NCC,…

PowerShell RAT malware

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in

Microsoft and the PetitPotam Attacks

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

En Mayo, Microsoft lanzó una actualización de seguridad, as it had

SSL Certificate

What is SSL Certificate?

Many of us have probably noticed various security-related markings around

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit attacks the Canadian defensive co. Top Aces inc

Canadian defense contractor Top Aces Inc became the victim of

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Tras las correcciones recientes para una gran cantidad de vulnerabilidades UEFI,…

famous spyware attacks

The 5 Most Famous Spyware Attacks

Spyware can be called the most sophisticated malware these days.

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

No hace mucho tiempo, a cybersecurity analyst posted a

remove yahoo search

Yahoo Search: How to Remove Yahoo from Chrome?

Yahoo Search is a legitimate search engine that exists for

malware

Can Malware Spread Through a Shared Wi-Fi Connection?

It is hard to imagine the modern world without wireless