XML Vulnerabilities and how serious they are
XML external entity injections are a type of vulnerability that has become very popular in recent years, in fact it…
EternalBlue was the exploit used by WannaCry
WannaCry sparked one of the largest cyberattacks the world has ever seen. And while the threat itself is not causing…
Apache HTTP Server and its vulnerabilites
Apache HTTP Server is free, open source web server software for Unix platforms that runs 46% of the world’s web…
Cyborg Ransomware distributed through Email
This problem started with users who started receiving emails with supposed Windows updates which they said were urgent. What happens…
Vulnerabilities in Microsoft Edge
Microsoft Edge is promising and has been a widely used browser with what it promises (since it is based on…
Videoconference Security, How can we improve it
Video conferencing applications have taken on a notable role due to the COVID-19 health crisis. They help us stay in…
The increase of cyberattacks estimated for this year
Given that the challenges in terms of security and protection have increased due to the adoption of teleworking during the…
Silver Sparrow, A malware that affected macOS
Apple’s new M1 chip is the target of cybercriminals. A new malware called Silver Sparrow whose intentions are still unknown…
Fake Profiles and the risks these represent
Social Networks are key for any company that intends to grow both informatively and to increase customer acquisition thanks to…
Attack on Microsoft Exchange, Emails on risk
Cybersecurity reports reveal that four exploits found in Exchange Server software led to the hacking of more than 30,000 emails…

