ETC-Logo-transparente
ETC-Logo-transparente

Microsoft reveals that hackers are using Google Ads to distribute Royal Ransomware

In a recent report, Microsoft has revealed that a group is carrying out threatening activities, which are in development to distribute Royal Ransomware through Google Ads. This ransomware is relatively new, but it is already doing a lot of damage to the systems where it is used. The following lines will explain more about this […]

Meta fires dozens of employees for helping to recover accounts fraudulently

The Wall Street Journal just reported that Meta had to fire more than two dozen employees and contractors for fraudulently using a service only internal workers have access to. In the following lines, it will be explained how everything happened in the mother company of Facebook. Read: North Korean hackers are using a Dtrack malware […]

North Korean hackers are using a Dtrack malware update

Hackers linked to the North Korean government are using an update of the Dtrack malware in the form of a backdoor. This time, their victims are in European and Latin American countries focused on education, chemical manufacturing, governmental research centers and policy institutes, IT service providers, utility providers, and telecommunication firms. Read all about these […]

Researcher was rewarded with $70,000 for solving a flaw in Google Pixel Smartphones

Security researcher David Schütz was rewarded by Google after he discovered a serious flaw in the tech giant’s Pixel smartphones. This reward was given in cash and reached $70,000, and although the flaw was reported in June of this year, it was not disclosed until this month as part of the giant’s monthly Android update. […]

Chrome is remotely controlled through malicious extensions

Google’s browser, Chrome, and Chromium-based browsers like Edge, are vulnerable to malicious extensions due to a bonnet called “Cloud9.” Through this method, they manage to steal online accounts, log keystrokes, inject ads and malicious JS code, and enlist the victim’s browser in DDoS attacks. To know the details, continue reading the following lines. Read: Dropbox […]

Dropbox suffered a security breach through phishing

The Dropbox storage service confirmed that it suffered a security breach in mid-October, all due to a phishing attack that targeted one of its employees. Thanks to these credentials, the attackers had access to the GitHub repositories and stole several pieces of information. Find out the details in the following lines. Read: Passkeys, the future […]

Passkeys, the future of passwords

Passwords are a necessary evil. Although they are needed, they can be a real headache. Cybersecurity experts like Eagle Tech Corp recommend having a different one for each account, but this becomes extremely complicated when there are so many to handle. For this reason, “passkeys” is now emerging: a new way of having better control […]

The hacktivist group Guacamaya leaks 1TB of information about various armies in Latin America

This year, the well-known hacktivist group Guacamaya turned its sights towards the most important armies of this American region. It is not the first time this group has released sensitive information, which concerns environmental issues, corruption, and human rights (especially those towards women and ethnic groups). However, this time the hacked information shows data that […]

A suspect of being part of Lapsus$ was arrested in Brazil

On October 19, the Brazilian Federal Police arrested a fellow citizen suspected of being part of Lapsus$, the cybercriminal group that has caused great havoc during the year to important companies around the world. There are several interesting details about this arrest and the subsequent investigation. This article will show what is happening around this […]

Verizon suffers a breach in its systems and warns affected users

The telecommunications company Verizon alerted an undisclosed number of users that they suffered a security breach, which led the attackers to obtain users’ credit card information, among other data. In addition to exposing these accounts to SIM swapping attacks. The company released its own statement, but some details do not match what was stated by […]