Google Cloud succeeds in blocking the largest DDoS attack to date

Largest DDoS attack

Google Cloud is the service where products such as Drive, Photos, among others, are derived. This service has been updated over the years to offer the best to its users. One of the things that they have always placed a lot of emphasis on is security. Thanks to this, a few days ago, they managed […]

Most used techniques to steal bank details

steal bank details

Digital banking has become a widely used tool in recent years. After all, who doesn’t like to have quick access to all their financial products with a single account, and at their fingertips? But, precisely because they have this digital footprint, it is very easy for many cybercriminals to steal users’ bank details. This article […]

Interesting emails? They may be a phishing scam

interesting emails

Every day, millions of emails arrive at the different accounts managed by each user, from professional to personal, including backup accounts. However, through this route, it is very easy to trick anyone using interesting emails. The technique that cybercriminals use for this is a well-known one, but it is still very efficient. Learn more in […]

Nearly 2,000 Signal accounts were compromised by Twilio’s hack

Signal

Signal is a very popular messaging app, thanks to its end-to-end encryption feature. However, this Monday, they announced in a statement that the hack suffered in Twilio at the beginning of the month affected almost 2,000 Signal accounts. All the details will be disclosed in this article. Read: Cisco confirms hack last May Twilio’s hack […]

Cisco confirms hack last May

Cisco confirms hack

The large technology company Cisco confirmed in recent days that it was the victim of a cyberattack perpetrated last May. The confirmation comes because the Yanluowang ransomware group published a list of files stolen from Cisco. But there are many more details surrounding this attack and what has been shared these days. Read everything in […]

Microsoft blocks macros in Office; cybercriminals change their technique

Microsoft blocks macros

Microsoft, the technology giant father of the Windows system and related products, has announced that it will block macros by default in its Office suite, which has led cybercriminals to look for new ways to trick users through files. This shift in malware distribution has been a novel test of hackers’ intelligence. In today’s article, […]

Meta takes action against cyberespionage groups that abuse its Facebook platform

Meta takes action

In recent months, there have been several cases of cyberespionage in different countries that use Facebook as their means of contact. Given this, Meta takes action against them, which led to interesting discoveries about these hackers’ working methods; they were exposed in its Quarterly Adversarial Threat Report. Read the details in the following lines! Read: […]

Solana suffers a hack with losses of around USD $5 million

Solana

Blockchain platforms, crypto-wallets, and cryptocurrencies are already very common. They have become part of everyday web movements and the vocabulary of many users. However, on rare occasions, when cybercriminals attack the systems of these platforms, users can lose a lot of money. This is the case today; Solana suffered a hack a few hours ago, […]

Twitter faces a data breach of 5.4 million accounts

a data breach

2022 has not been the best year for Twitter; from the problems it has had thanks to Elon Musk to breaches in its security, the little blue bird has been having a terrible few months. But that has not stopped its users from continuing to interact and share their thoughts. After all, in this network, […]

30 apps that distribute malware were found in the Play Store

apps that distribute malware

Downloading apps is something very common on any smartphone and tablet. They have become so popular that applications have been created for PCs, and we cannot ignore the web ones. But in one of the most popular app stores, the Play Store, 30 apps that distribute malware were found. Learn the details in the following […]