Why Office Packages can be so Dangerous?
One of the many strategies used by cybercriminals to try to infect their victims’ computers is by sending a document…
DNS Rebinding – A dangerous threat to your network
DNS Rebinding is a very present threat and is exploited by criminals since with this attack, it is possible to…
Golden SAML is a counterfeiting threat
The attack on SolarWinds Orion, carried out by the threat actor (UNC2452), has been one of the most elaborate on…
Sextortion is a practice to watch out for
Extortion on the Internet is a very old crime and modern technologies have helped to empower it (as with many…
La importancia de saber sobre el Cyberbullying
Las nuevas tecnologías han traído nuevas formas de acosar, acosar, abusar e intimidar mas bien conocido como Cyberbullying. Se han…
VPS KVM technology and how it works
Kernel-based virtual machine (KVM) is an open source virtualization technology built into Linux. Specifically, with KVM you can turn Linux…
ANIMAL – The first Trojan in history
A Trojan or Trojan horse is a type of malware that often disguises itself as legitimate software. Cybercriminals and hackers…
¿Que función cumple un equipo CERT?
Un Equipo de Respuesta a Emergencias Informáticas también conocido como CERT, es un grupo de expertos en seguridad informática encargados…
CERT – What is a CERT team
Despite having originated as a military project, the internet was not born safe. In fact, it is about three decades…
ToxicEye RAT – Takes use of telegram communication
Cybercriminals are making use of the Telegram API as a means of communication to their C2, thanks to the infrastructure…

