ADB Miner – Malware that mines on Android Devices
Apparently, ADB.Miner uses part of the Mirai code for its detection mechanism for vulnerable devices, the well-known Trojan involved in…
Web Streaming – May Contain Malware
The way we watch our favorite series and movies today has nothing to do with a few years ago. We…
KryptoCibule – Mining and Stealing Malware
A new report published by the cybersecurity firm ESET warns of a new type of malware called KryptoCibule, which, unlike…
Capcom receives a Ransomware Attack
This was revealed by Capcom executives through a statement issued by the company on November 4, this attack that capcom…
Where did the Java Language originate?
The Java Language was developed in its beginnings by James Gosling, in 1991. Initially Java was known as Oak or…
The steps of the Cyber Kill Chain and what is it?
To detect and combat Cyber Kill Chain attacks in time, it is necessary to know in detail the strategies of…
The most anticipated union, Linux and Windows
A well known open source advocate, Eric S. Raymond, has ventured to say on his personal blog that the convergence…
Zero Day bug in Chrome browser got fix
A new vulnerability with no patches or patches were created, and which is used to carry out an attack. The…
IPStorm – What we know about this botnet
Behind the executing hand of cyberattacks, there are motivations other than pure extortion and theft that cybercriminals often practice. Motivations…
New Joker infected Apps discovered
As we have already seen in the article in which we talk about this malware, the researchers have announced, the…

