Microsoft releases its March update package

Every few weeks, Microsoft releases a new update package to fix bugs and vulnerabilities, which is known as patching. This serves to protect users from possible failures or unwanted access to their systems and, therefore, their data. And it’s not just Microsoft that releases these packages; many companies do this. Learn more details in the […]

Samsung is the new victim of the LAPSUS$ group

The electronics company Samsung, very famous for its smartphones, has become a new victim of the extortion group LAPSUS$. In this new attack, the stolen data shows details of the very popular Galaxy series. This one is added to the new wave of attacks on big brands that are going on in the year. Learn […]

NVIDIA suffers cyberattack that exposes important data

NVIDIA is an American company dedicated to manufacturing chips for supercomputers, but in February, it was a new victim of cybercriminals. According to researchers and the perpetrators themselves, they managed to gain access to confidential data that ranges from information on their employees and credentials to source codes of their technologies. More information will be […]

Cyberwar: the modern scenario of war conflicts

With the invasion that is being carried out by the Russian army in Ukraine, the eyes and interests of the world are focused there. It turns out that Russia has been running a cyberwar against Ukraine for years, which has not been of the utmost importance to the world despite being known thanks to the […]

Businesses must follow these cloud data security practices

Today, many businesses place their processes and operations on the services offered by the cloud. There are many clouds out there, even from top-tier companies such as Google and Microsoft, but all of them present security problems to some degree. For that reason, it’s highly recommended that businesses follow cloud data security practices to protect […]

Puma faces a data breach that compromises its employees

Sportswear company Puma was the victim of a data breach in January, which was triggered by an attack on Kronos’ private cloud. This attack made it possible for cybercriminals to steal the data of the company’s employees. This all happened without any knowledge, and Kronos has already acted to tighten its security in the cloud. […]

France says using Google Analytics violates GDPR laws

Europe is making a brutal campaign against the transfer of data from internet users located in the old continent to the American one. On this occasion, France has established that the use of Google Analytics is a violation of GDPR laws in the European Union, following Austria’s footsteps. This is not the only thing that […]

Microsoft discovers a variant of UpdateAgent malware for Mac computers

The team in charge of searching, recognizing, and investigating threats at Microsoft has found an undocumented Trojan that attacks and infects Mac computers called UpdateAgent. The most interesting thing, and what worries the team at the Windows company, is its ability to progress since its first appearance in September 2020. This article will show the […]

CISA is concerned about an actively exploited Windows vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is always monitoring the vulnerabilities that appear and those that have not been fully controlled. In this case, we have an exploited Windows vulnerability that continues causing problems. Although Windows is working hard to patch it, there is still a danger of compromising sensitive information. Learn the […]

Authorities charged six Indian call centers for scams

Six Indian call centers were indicted for their alleged involvement in different scams, making calls to thousands of consumers in the United States. Apparently, it is not the first time that these companies in the Asian country have been accused of carrying out this type of scam. Learn more about this delicate topic in this […]

Essential Addons for Elementor is affected by a bug

WordPress has not had it easy in recent months. Several of its plugins and extensions have been affected by different bugs and vulnerabilities.This time, a bug was found in the Essential Addons for Elementor plugin, which causes great concern because millions of users widely use it due to its features. Learn all the details in […]

Google abandons Topics and FLoC

Google announced that it has decided to abandon its plan to use the new Privacy Sandbox proposal called Topics and FLoC, eliminating third-party cookies, for a function that would allow users’ browsing habits to be categorized in a list of “Topics.” But there is much more to understand about this, which is why today’s article […]

The New Generation of Cybercriminals Surprises

In an increasingly technological and digital world, it should not surprise us that advances in these technologies are quickly learned and used by young people. It is not strange to see children between the ages of 3 and 10 handling a smartphone as if they were adults. That is why the new generation of cybercriminals […]

Three WordPress Plugins are Vulnerable

WordPress is one of the main hosting services for websites that exist. To offer the best sites, a series of plugins are used that help different functionalities depending on the nature of it. But in recent days, researchers found a security flaw in 3 of these plugins that affects the security of users who rely […]

The Use of Public Wi-Fi Networks

Being connected in today’s world is something very essential, so the use of public Wi-Fi networks has become very common. However, these networks can bring many inconveniences and even dangers from cybercriminals. In fact, they are great users of these networks, because it is difficult to track them through them. For that reason, today’s article […]

What are Cookies on Websites and Their Function?

Every time a user browses the internet and enters a new website, they’ll find a request to accept “cookies.” For convenience, most just pass these by and accept without knowing exactly what they are and what their function is. Today, we will talk precisely about these cookies on websites and how they can interfere with […]

Hackers Are Using Cloud Services to Spread Malware

Hackers are using cloud services offered by companies like Amazon and Microsoft to successfully distribute malware, such as remote access Trojans known as Nanocore, Netwire, and AsyncRAT, gaining access to systems and compromising information. Read all about this new method in this article. Read: Google Chrome is Patching Several Vulnerabilities Cloud services are the perfect […]

Google Chrome is Patching Several Vulnerabilities

The famous browser Google Chrome is presenting its first update of the year under the version 97.0.4692.71. This is caused by the discovery of 37 new vulnerabilities that put users at risk by giving access to the whole device system, not only the data from the browser itself. Keep reading the article to find out […]