Noticias, Consejos, Laboratorio de seguridad

Bed Bath & Beyond Shopping Scams Explained

Bed Bath & Beyond Shopping Scams

A finales de abril, 2023, Bed Bath, minorista estadounidense de artículos para el hogar & Beyond se acogió a la protección por quiebra según el Capítulo 11. Éste…

Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group

A Russian cybercriminal gang BlackCat claims to have hacked into one of Britain’s most prominent hospital groups and threatens to

TeamTNT Group Returns with Silent Bob Campaign

Los investigadores de seguridad de Aqua Security han advertido que el grupo TeamTNT puede estar preparando una nueva campaña anti-nube a gran escala llamada «Silent

Proxyjacking: The Latest Cybercriminal Invention In Action

Hoy, en el mundo en constante cambio de las amenazas cibernéticas, attackers always look for new ways to get more benefits with

PlugX malware attacks European diplomats

En los últimos meses, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

Se ha descubierto una vulnerabilidad (CVE aún no emitido) en…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Análisis de más de 40 chats with victims allowed the

What is a Smurf Attack? How does it work?

What is a Smurf Attack? How Does It Work?

Pitufo, o ataque pitufo, is a kind of DDoS attack.

Typosquatting

What is Typosquatting: How Does It Work in 2022?

There is a special trap on the Internet for people,…

Rootkit Attack

How to Prevent a Rootkit Attack?

Quizás ya hayas escuchado en alguna parte el nombre rootkit1. El…

Ukraine hit by DDoS attacks

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Equipo ucraniano de respuesta a emergencias informáticas (CERT-UA) said that Ukraine was

Maze Ransomware

Maze Ransomware Attack: All You Need to Know

En los últimos años ransomware2 has become

Zero Day Attacks - How To Prevent Them?

Zero-Day Vulnerability: Understanding the Real Threats

Zero-day vulnerability are the real mess of a modern cybersecurity

mustang panda cyberspies

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

Secureworks researchers have discovered a phishing campaign by Chinese Mustang

Passwords

Use Strong Passwords to Can’t be Hacked

A password to an internet service account, perfil de redes sociales,…

Cybersecurity Threats

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than

  1. Rootkit malware
  2. What is ransomware read here