Noticias, Consejos, Laboratorio de seguridad

Clop LockBit and PaperCut

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft ha vinculado ataques recientes a servidores PaperCut con operaciones de ransomware de Clop y LockBit, which used vulnerabilities to steal

PaperCut Vulnerability Allows RCE, Exploited in the Wild

corte de papel, una solución de software utilizada para la gestión de impresión, appears to be vulnerable to remote code execution (ICE). Another security violation

New SLP Vulnerability Allows 2200x DDoS Amplification

Una vulnerabilidad recientemente descubierta en SLP, un protocolo de red heredado, puede usarse para aumentar desastrosamente la eficiencia de los ataques DDoS. As researchers

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another

Capita Hacked, Black Basta Gang Publishes Data

capitana, una empresa de subcontratación de procesos comerciales internacionales con sede en Londres, fue hackeado recientemente. Users noticed strange events in the company earlier this

Wi-Fi Devices and Frag Attacks

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery

cyberattacks on water supply systems

FBI investigates cyberattacks on two water supply systems in Pennsylvania

El mes pasado, la Red local de Respuesta a la Acción por el Agua, which includes

Qualcomm Mobile Station Modem

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world

Chrome 90 security feature

Chrome 90 gets new security feature to protect against attacks on Windows 10

Google has introduced a new Windows 10 security feature called

Adobe flash player

Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021

Según el elaborado plan de los fabricantes., desde principios de 2021 apoyo…

bypasses Specter protection

New Micro-op Cache Attack Bypasses Specter Protection

A team of researchers from the Universities of Virginia and

GitHub review exploit policy

GitHub Developers Review Exploit Posting Policy Due to Recent Scandal

The GitHub developers review the exploit posting policy and want

Hacked OGUsers Forum

Attackers Hacked OGUsers Hacking Forum Again

Recientemente, the media reported that attackers hacked one of the

major vulnerability in V8

Google fixed another major vulnerability in the V8 engine

A series of feverish fixes for problems in Google Chrome

new Apple logo

Criminals threaten to leak new Apple logo, if the company doesn’t pay the ransom

Last week it became known that the operators of the

Tesla's autopilot without driver

Researchers made Tesla’s autopilot work without a driver

Tesla’s autopilot system can be easily tricked into driving a

Prometei attacks Microsoft Exchange

Prometei botnet attacks vulnerable Microsoft Exchange servers

Dado que los parches para los problemas de ProxyLogon aún no estaban instalados,…