ETC-Logo-transparente
ETC-Logo-transparente

Cyberwar: the modern scenario of war conflicts

With the invasion that is being carried out by the Russian army in Ukraine, the eyes and interests of the world are focused there. It turns out that Russia has been running a cyberwar against Ukraine for years, which has not been of the utmost importance to the world despite being known thanks to the […]

Businesses must follow these cloud data security practices

Today, many businesses place their processes and operations on the services offered by the cloud. There are many clouds out there, even from top-tier companies such as Google and Microsoft, but all of them present security problems to some degree. For that reason, it’s highly recommended that businesses follow cloud data security practices to protect […]

Puma faces a data breach that compromises its employees

Sportswear company Puma was the victim of a data breach in January, which was triggered by an attack on Kronos’ private cloud. This attack made it possible for cybercriminals to steal the data of the company’s employees. This all happened without any knowledge, and Kronos has already acted to tighten its security in the cloud. […]

France says using Google Analytics violates GDPR laws

Europe is making a brutal campaign against the transfer of data from internet users located in the old continent to the American one. On this occasion, France has established that the use of Google Analytics is a violation of GDPR laws in the European Union, following Austria’s footsteps. This is not the only thing that […]

Microsoft discovers a variant of UpdateAgent malware for Mac computers

The team in charge of searching, recognizing, and investigating threats at Microsoft has found an undocumented Trojan that attacks and infects Mac computers called UpdateAgent. The most interesting thing, and what worries the team at the Windows company, is its ability to progress since its first appearance in September 2020. This article will show the […]

CISA is concerned about an actively exploited Windows vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is always monitoring the vulnerabilities that appear and those that have not been fully controlled. In this case, we have an exploited Windows vulnerability that continues causing problems. Although Windows is working hard to patch it, there is still a danger of compromising sensitive information. Learn the […]

Authorities charged six Indian call centers for scams

Six Indian call centers were indicted for their alleged involvement in different scams, making calls to thousands of consumers in the United States. Apparently, it is not the first time that these companies in the Asian country have been accused of carrying out this type of scam. Learn more about this delicate topic in this […]

Essential Addons for Elementor is affected by a bug

WordPress has not had it easy in recent months. Several of its plugins and extensions have been affected by different bugs and vulnerabilities.This time, a bug was found in the Essential Addons for Elementor plugin, which causes great concern because millions of users widely use it due to its features. Learn all the details in […]