Hiddad malware that affected Android systems
We well know that the threats we find on the Internet are very dangerous but there are some that affect and spread more than others, this is the case of…
Remote Code Execution – How Dangerous it is
Remote code execution is the ability for an attacker to access someone else’s computing device and make changes, no matter where the device is geographically located. The vulnerabilities can provide…
xHelper Trojan that hits Android real hard
Android malware called xHelper posing as a cleaning app has reached tens of thousands of smartphones using Google operating systems. Although the application has been around for a year, now…
RIP Protocol and how it directs our information
The Routing Information Protocol (RIP) is used to manage router information in a self-contained network, such as a corporate LAN or a private WAN. With RIP, the gateway host sends…
Triada Trojan that terrorized Android in its time
Some may remember it and have even experienced it since this happened in 2016, just when Kaspersky Lab experts discovered a new malware in the form of a mobile virus…
Agent Tesla is an evolving old enemy
As with Netwire, Agent Tesla is an old acquaintance that has been evolving in recent years. These two threats are classified as remote control tools (RAT) and are used by…
Molerats, A Troubled Cybercriminal Group
Cybercriminals seek to act on the types of accounts we use the most. Their intention is none other than to obtain stolen data from the accounts they are attacking. Thus,…
SNMP, A useful management protocol
SNMP stands for Simple Network Management Protocol. It is a protocol for managing the transfer of information in networks, especially for use in LAN, depending on the version chosen. Its…
Matanbuchus demonic threat lurking on the Web
Unfortunately for everyone a new threat has appeared called Matanbuchus which is a Loader service (MaaS) created by the BelialDemon group. This is a cybercrime actor who references demonic themes…
CDP – Vulnerabilities of this protocol
CDPwn is a set of vulnerabilities which we will see today affecting Cisco network infrastructure equipment (switches, routers, IP phones and IP cameras). CDPwn vulnerabilities reside in the processing of…