Noticias, Consejos, Laboratorio de seguridad
Bed Bath & Beyond Shopping Scams
A finales de abril, 2023, Bed Bath, minorista estadounidense de artículos para el hogar & Beyond se acogió a la protección por quiebra según el Capítulo 11. Éste…
Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group
A Russian cybercriminal gang BlackCat claims to have hacked into one of Britain’s most prominent hospital groups and threatens to…
TeamTNT Group Returns with Silent Bob Campaign
Los investigadores de seguridad de Aqua Security han advertido que el grupo TeamTNT puede estar preparando una nueva campaña anti-nube a gran escala llamada «Silent…
Proxyjacking: The Latest Cybercriminal Invention In Action
Hoy, en el mundo en constante cambio de las amenazas cibernéticas, attackers always look for new ways to get more benefits with…
PlugX malware attacks European diplomats
En los últimos meses, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to…
A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices
Se ha descubierto una vulnerabilidad (CVE aún no emitido) en…
F5 warns of critical BIG-IP RCE vulnerability
F5, Inc warned the users about the critical vulnerability that…
Experts analysed the conversations of Conti and Hive ransomware groups
Análisis de más de 40 chats with victims allowed the…
What is a Smurf Attack? How Does It Work?
Pitufo, o ataque pitufo, is a kind of DDoS attack.…
What is Typosquatting: How Does It Work in 2022?
There is a special trap on the Internet for people,…
How to Prevent a Rootkit Attack?
Quizás ya hayas escuchado en alguna parte el nombre rootkit1. El…
Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites
Equipo ucraniano de respuesta a emergencias informáticas (CERT-UA) said that Ukraine was…
Maze Ransomware Attack: All You Need to Know
En los últimos años ransomware2 has become…
Zero-Day Vulnerability: Understanding the Real Threats
Zero-day vulnerability are the real mess of a modern cybersecurity…
Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials
Secureworks researchers have discovered a phishing campaign by Chinese Mustang…
Use Strong Passwords to Can’t be Hacked
A password to an internet service account, perfil de redes sociales,…
20 Dangerous Types of Cybersecurity Threats
The cybersecurity threats in this year are more considerable than…