Numando new Banking Trojan Lurking on the Web
The threat actor behind this malware family has been active since at least 2018. Like the other Latin American banking Trojans described in this series, Numando is written in Delphi…
Cloud Server and Hosting Tutorials, News and Tricks
The threat actor behind this malware family has been active since at least 2018. Like the other Latin American banking Trojans described in this series, Numando is written in Delphi…
An Advanced Persistent Group that has been active for several years, HoneyMyte, also known as Mustang Panda, has adopted different techniques to carry out attacks in recent years and has…
On September 14, Wiz researchers disclosed a set of four vulnerabilities in Microsoft’s Open Management Infrastructure (OMI), an open source Common Information Model (CIM) management server used to manage Unix…
One of the many strategies used by cybercriminals to try to infect their victims’ computers is by sending a document from the Office suite (text documents, spreadsheets, presentations, among others)…
DNS Rebinding is a very present threat and is exploited by criminals since with this attack, it is possible to bypass the firewall, browse corporate networks, display sensitive documents and…
The attack on SolarWinds Orion, carried out by the threat actor (UNC2452), has been one of the most elaborate on the supply chain, and uncovered one of the most innovative…
Extortion on the Internet is a very old crime and modern technologies have helped to empower it (as with many other things). This is where sextortion is, which is a…
Las nuevas tecnologías han traído nuevas formas de acosar, acosar, abusar e intimidar mas bien conocido como Cyberbullying. Se han introducido nuevas formas de acoso a través de las redes…
Kernel-based virtual machine (KVM) is an open source virtualization technology built into Linux. Specifically, with KVM you can turn Linux into a hypervisor that allows a host machine to run…
A Trojan or Trojan horse is a type of malware that often disguises itself as legitimate software. Cybercriminals and hackers can use Trojans to try to access user systems. Generally,…