SolarWinds cyberattack affects thousands of Microsoft users
Microsoft has just confirmed that it was affected by the recent SolarWinds hack, although it ruled out a supply chain compromise to infect its customers. A few days ago itRead More →
Microsoft has just confirmed that it was affected by the recent SolarWinds hack, although it ruled out a supply chain compromise to infect its customers. A few days ago itRead More →
In recent years SolarWinds has established itself as one of the most important companies in the development of IT solutions: “There is no one in the market really close inRead More →
Trend Micro security teams notified their customers of an urgent update for their InterScan web security virtual appliance, released to fix various vulnerabilities that could compromise users’ systems. Although theRead More →
Recent reports indicate that security flaws in protocols used by 5G network installations could expose users to various attacks, including identity theft, phishing, among others. The report, prepared by PositiveRead More →
A group of threat actors operated a global fraudulent campaign that robbed millions of dollars of banks in the United States and some European countries. Threat actors reportedly used hugeRead More →
A group of specialists has revealed the discovery of a new variant of surveillance and spying malware for iOS and Android devices. Identified as Goontact, the new spyware has theRead More →
Hewlett Packard Enterprise (HPE) security teams released a report related to a recently found zero-day remote code execution vulnerability in the latest versions of HPE Systems Insight Manager (SIM) forRead More →
This has probably been the most difficult year in a long time, with virtually all industries and services being impacted by the pandemic. Fortunately it is about to end, nonetheless,Read More →
Cloudflare is a denial of service (DDoS) protection mechanism for your servers or, so to speak, it is a barrier between the user and the websites they visit. This toolRead More →
WiFi security is an element that sometimes receives little attention from system administrators, although it is a fundamental factor in consolidating a secure IT environment, pentesting specialists from the InternationalRead More →