The emergence of security vulnerabilities is a constant in software development, so it is important that cybersecurity specialists learn to identify potential security risks and some incident prevention mechanisms. This
The NBA has confirmed that the Houston Rockets’ IT systems have been compromised by a security incident allegedly operated by a newly created ransomware group. Apparently, the incident would have
Many of the most sophisticated malware variants have the ability to analyze whether the system on which they run is protected by a sandbox; if so, these malware variants can
A security report details the finding of malicious code in the official APKPure app, one of the most popular app stores for Android devices outside the Play Store. This platform
This time, experts in malware analysis from the International Institute of Cyber Security (IICS) will show you an easy procedure to create fake websites in order to extract information from
Through its official spokesperson, the European Commission acknowledged that last March it was the victim of a dangerous cyberattack that would also have affected other organizations in the European Union.
A mobile security researcher in Germany reports the detection of a new wave of malware affecting smartphones developed by the German company Gigaset. The report, prepared by Günter Born, mentions
Specialists at security firm Check Point detailed the finding of a new WhatsApp session hijacking attack in which threat actors employ a malicious app disguised as a legitimate Netflix tool.
Through a security alert, the University of California administration has alerted its staff and students that their confidential information may have been compromised by a ransomware group attack. The incident
A group of threat actors maintains an active attack targeting GitHub Actions systems with the intention of extracting cryptocurrency in a hacking variant known as cryptojacking. As you may remember,