The steps of the Cyber Kill Chain and what is it?
To detect and combat Cyber Kill Chain attacks in time, it is necessary to know in detail the strategies of cyber thieves. This is the only way to take appropriate…
To detect and combat Cyber Kill Chain attacks in time, it is necessary to know in detail the strategies of cyber thieves. This is the only way to take appropriate…
A well known open source advocate, Eric S. Raymond, has ventured to say on his personal blog that the convergence between Linux and Windows will be unstoppable and that Microsoft…
A new vulnerability with no patches or patches were created, and which is used to carry out an attack. The name Zero day is because there is no patch yet…
Behind the executing hand of cyberattacks, there are motivations other than pure extortion and theft that cybercriminals often practice. Motivations such as espionage and sabotage, attempts to interfere in processes…
As we have already seen in the article in which we talk about this malware, the researchers have announced, the Joker has been designed to steal contact lists from the…
One of the aspects in which cloud service providers have paid attention the most is without a doubt that of security due to all the threats that arise. Companies such…
Root permissions have access to all commands and files with full read, write or execute permissions and can be used to execute any type of task within the operating system…
When we want to do some specific tasks on our Linux system it is necessary to have Root permissions. Normally, when the system is installed on our disk, it has…
Since late August, cybersecurity researchers have identified increased activity at a cryptocurrency mining botnet called Lemon Duck. The botnet has been around since December 2018, however a huge jump in…
A new family of malware has been discovered affecting the Android mobile platform. The great similarities with the already known Cerberus make one suspect that this new malware has not…