Noticias, Consejos, Laboratorio de seguridad

Domino Uses Parts of Lizar Malware, Delivered by Dave Loader

Domino Backdoor is Lead by FIN7 and Conti Actors

Un nuevo Domino Backdoor apareció a principios de 2023. Desde febrero, a new malware family coined Domino is

Can PDFs Have Virus? Exploring the Risks of Downloading PDF Files

Entre muchos otros archivos, Los archivos PDF se consideran uno de los más convenientes para usar en documentos de solo lectura.. They prevent editing

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894

Vulnerability Found in Twitter Code That Provokes a «Shadowban» of the Victim

Recientemente, Twitter cumplió promesa de Elon Musk y publicó en GitHub el código fuente de su algoritmo de recomendación,…

Strange Enthusiasts Asked ChaosGPT to Destroy Humanity and Establish World Domination

Los entusiastas lanzaron el proyecto ChaosGPT, basado en el Auto-GPT de código abierto, y a AI se le dio acceso a Google y se le pidió que…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

El fin de semana pasado se conoció que información de más de…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

Esta semana, the US Department of Justice indicted Wyatt Travnichek,…

DDoS attacks becoming the norm

Akamai Says Powerful DDoS Attacks Are Becoming the Norm

Según los cálculos de Akamai, powerful ransomware DDoS attacks are becoming

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

El conocido experto en seguridad de la información., journalist and author of the

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

Los lunes, 29 de marzo, security researchers uncovered two vulnerabilities in

Slack Connect DM feature

Slack Connect DM new feature drew a barrage of criticism

This week Slack Messenger developers announced a new Connect DM

Attackers using DCCP protocol

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP

job seekers work for cybercriminals

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

CheckPoint experts found that the number of job search ads

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

El ransomware REvil atacó a la empresa taiwanesa Acer (the sixth-largest

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

El ruso, quien ofreció un especialista en Tesla $1,000,000 for installing