Noticias, Consejos, Laboratorio de seguridad
Domino Backdoor is Lead by FIN7 and Conti Actors
Un nuevo Domino Backdoor apareció a principios de 2023. Desde febrero, a new malware family coined Domino is…
Can PDFs Have Virus? Exploring the Risks of Downloading PDF Files
Entre muchos otros archivos, Los archivos PDF se consideran uno de los más convenientes para usar en documentos de solo lectura.. They prevent editing…
Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit
Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894…
Vulnerability Found in Twitter Code That Provokes a «Shadowban» of the Victim
Recientemente, Twitter cumplió promesa de Elon Musk y publicó en GitHub el código fuente de su algoritmo de recomendación,…
Strange Enthusiasts Asked ChaosGPT to Destroy Humanity and Establish World Domination
Los entusiastas lanzaron el proyecto ChaosGPT, basado en el Auto-GPT de código abierto, y a AI se le dio acceso a Google y se le pidió que…
Information of 533 million Facebook users leaked to the public
El fin de semana pasado se conoció que información de más de…
Hackers Bypass Firewalls Using Windows Feature
Hackers now bypass firewalls using a legitimate component of the…
Kansas resident charged with hacking water utility computer system
Esta semana, the US Department of Justice indicted Wyatt Travnichek,…
Akamai Says Powerful DDoS Attacks Are Becoming the Norm
Según los cálculos de Akamai, powerful ransomware DDoS attacks are becoming…
Hackers attack Microsoft Exchange servers on behalf of Brian Krebs
El conocido experto en seguridad de la información., journalist and author of the…
New vulnerabilities help to bypass protection from Specter on Linux systems
Los lunes, 29 de marzo, security researchers uncovered two vulnerabilities in…
Experts have discovered bugs in the 5G protocol that allow tracking location and arranging of DoS attacks
AdaptiveMobile specialists have published a report on new bugs in…
Slack Connect DM new feature drew a barrage of criticism
This week Slack Messenger developers announced a new Connect DM…
Attackers using DCCP protocol for DDoS attacks
Akamai has noticed that attackers are using the little-known DCCP…
Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
CheckPoint experts found that the number of job search ads…
REvil ransomware operators attacked Acer and demand $50,000,000
El ransomware REvil atacó a la empresa taiwanesa Acer (the sixth-largest…
Russian who tried to hack Tesla was pleaded guilty
El ruso, quien ofreció un especialista en Tesla $1,000,000 for installing…