Noticias, Consejos, Laboratorio de seguridad

iOS is Vulnerable to Zero-Click Exploit That Deploys Triangulation Spyware

New iOS Vulnerability Allows «Triangulation» Attack

New iOS vulnerability allows executing a zero-click malware delivery through the built-in iMessage messenger. The breach was discovered by Kaspersky

DDoS-For-Hire Services Used by Hacktivists in 2023

La mayoría de la gente piensa que hay que ser un hacker para participar en ciberataques.. Sin embargo, como lo ha demostrado el año pasado, downloading

Real People Perform CAPTCHA Solving Services for Hackers

Los analistas de Trend Micro hablaron sobre varios servicios que ofrecen servicios de resolución de CAPTCHA para ciberdelincuentes.. Según los investigadores, often these

Android Malware With Almost 500M Downloads Resides in Google Play

Millones de usuarios de Android pueden estar en riesgo de sufrir un ciberataque debido al malware de Android, and multiple modifications on Google

RarBG Torrenting Site Is Shut Down, Admins Explain Why

RarBG, uno de los sitios web de seguimiento de torrents más famosos del mundo, decidió cerrar voluntariamente. Launched in 2007,

FBI and the key from REvil

FBI Kept Secret Key To Decrypt Data After REvil Attacks

Journalists of The Washington Post found out how the FBI

BlackMatter attacked NEW Cooperative

BlackMatter ransomware attacked American farmers from NEW Cooperative

El ransomware BlackMatter atacó a la organización de agricultores estadounidense NEW Cooperative,…

Hoster Epik hack

Epik hoster hack affected 15 million users, not just the company’s clients

La semana pasada, Anonymous hacktivists reported about hack of the database

utility for decrypting data after REvil

Added utility for decrypting data after REvil attacks

The Romanian company Bitdefender has published a universal utility for

Anonymous attacked Epik

Anonymous hacktivists attacked the Epik hoster with the right-wing radical sites

Anonymous hacktivists attacked into the database of the domain registrar

Site Isolation in Google Chrome

SpookJS Attack Allows to Bypass Site Isolation In Google Chrome

Un grupo de científicos de universidades de Australia., Israel and

REvil resumed attacks

REvil ransomware resumed attacks

La semana pasada, la infraestructura de REvil (Sodinokibi) returned online after

fresh vulnerability in Ghostscript

PoC exploit published for fresh vulnerability in Ghostscript

A PoC exploit for a fresh vulnerability in Ghostscript was

The US authorities accused Ukrainian

US authorities accused Ukrainian citizen of running a brute force botnet

Las autoridades estadounidenses acusaron al ciudadano ucraniano de piratería informática.: a saber,…

REvil servers back online

Servers of the hack group REvil are back online

En julio 2021, la infraestructura de REvil (Sodinokibi) was turned

FBI experts and sextortion

FBI experts say that this year «sextortion» brought scammers more than $8 million

Expertos del Centro de Quejas de Fraude en Internet del FBI (IC3) habló…

Atlassian Confluence vulnerability

Atlassian Confluence vulnerability was exploited to install miners

A finales de agosto, Atlassian released a hotfix for a Confluence