Noticias, Consejos, Laboratorio de seguridad
Forged Driver Signatures Exploited In The Wild
Los piratas informáticos utilizan activamente la suplantación de firmas de controladores, que se origina en una laguna en el mecanismo de manejo de controladores en modo kernel de Windows. Ellos soportan mucho…
Legion Stealer targeting PUBG players
Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise…
MOVEit Transfer Fixes a New Critical Vulnerability
Luego de que cientos de empresas fueran atacadas con una vulnerabilidad de día 0 en MOVEit Transfer, the developer of this file transfer management…
California Water Treatment Plant Is in the Hands of a Hacker
Rambler Gallo, un residente de Tracy, California, has been charged with maliciously damaging a computer after it allegedly infiltrated a…
Wise Remote Trojan: Infostealer, RAT, DDoS Bot, and Ransomware
Wise Remote Stealer es un software potente y malicioso que funciona como un ladrón de información, Troyano de acceso remoto (RATA), robot DDoS,…
TOP Facts About Adware Attacks To Be Reminded Today
Para empezar, each of you has faced this challenge.…
Antivirus Is Important! Advantages Of Using
If you are one of those people who are contemplating…
Information Security Specialist Showed How to Steal a Tesla Car
Sultán Qasim Khan, un consultor de seguridad del Grupo NCC,…
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in…
Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay
En Mayo, Microsoft lanzó una actualización de seguridad, as it had…
What is SSL Certificate?
Many of us have probably noticed various security-related markings around…
LockBit attacks the Canadian defensive co. Top Aces inc
Canadian defense contractor Top Aces Inc became the victim of…
Vulnerability in HP BIOS causes system takeover
Tras las correcciones recientes para una gran cantidad de vulnerabilidades UEFI,…
The 5 Most Famous Spyware Attacks
Spyware can be called the most sophisticated malware these days.…
Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption
No hace mucho tiempo, a cybersecurity analyst posted a…
Yahoo Search: How to Remove Yahoo from Chrome?
Yahoo Search is a legitimate search engine that exists for…
Can Malware Spread Through a Shared Wi-Fi Connection?
It is hard to imagine the modern world without wireless…