Microsoft Outlook Outage Leaves Users Unable to Send or Receive Emails

Microsoft Outlook experienced an outage on Tuesday, preventing users from sending or receiving emails. This outage, while short-lived, was a reminder of the importance of having a reliable messaging system. The outage was found by users that reported issues while sending, receiving, or searching email through Outlook.com. The case was reported in North America but […]

Microsoft Introduces Bing Powered by OpenAI Language Model

This Tuesday, Microsoft announced a new version of its Bing search engine powered by a next-generation OpenAI language model, bringing a whole new level of intelligence to the search engine, making it faster and more accurate than ever. In the next lines, get to know about this new Microsoft step.  Read: Cyberthreats Around Valentine’s Day […]

Cyberthreats Around Valentine’s Day

Valentine’s Day is a time for love in any way, but it can also be a time of increased cyberthreats. Cybercriminals take advantage of this festivity to launch phishing and malware attacks and other attacks against unsuspecting victims. Know the top cyberthreats around Valentine’s Day and how to be protected from them. Read: The Hive […]

The Hive Ransomware Seizure

The recent seizure of the Hive ransomware operation’s Tor payment and data leak site, as part of an international law enforcement operation, has shown how many agencies around the globe can work together to infiltrate different infrastructure of cybercriminals gangs. Read the following lines to know all the details. Read: Colombian Company Audifarma Suffers Cyberattack […]

Colombian Company Audifarma Suffers Cyberattack

Audifarma, one of the largest drugstore chains in Latin America, recently suffered an external cyberattack that forced them to disable their physical and virtual servers to protect the organization’s and users’ information, taking their website and app are also out of service. This article will explain the details of the attack, the response from Audifarma, […]

A Credential Stuffing Attack Affected PayPal Accounts

PayPal recently suffered a large-scale credential stuffing attack with thousands of accounts compromised with credential stuffing, a type of cyber attack which uses stolen usernames and passwords taken from other data breaches to gain access to online accounts. This article will explain Credential Stuffing and how PayPal accounts were affected by it. Read: T-Mobile suffers […]

T-Mobile suffers an API data breach

Data breaches have become a common occurrence in the digital age. This time, it’s T-Mobile in the news for the wrong reasons, as hackers have managed to access the data of 37 million accounts of prepaid and postpaid clients belonging to the company. Everything was due to an API data breach. Learn more with the […]

University of Duisburg-Essen in Germany is the new victim of Vice Society

In November last year, the University of Duisburg-Essen (UDE) in Germany suffered a system breach. This breach was so great that it forced the institution to rebuild its IT infrastructure again, which is still ongoing today. After almost two months, the Vice Society group claims its authorship, publishing the stolen documents on its Tor site. […]

Fire Rescue Victoria in Australia are the new victims of the Vice Society group

The Vice Society group was one of the most active in 2022 and one of the most damaging with its Ransomware attacks. Its latest victim was the Fire Rescue Victoria, a state in Australia. Although the emergency services were not affected, their internal system was the one that took the biggest hit. Read all the […]

The Des Moines school district in Iowa is the new victim of a cyberattack

The Des Moines school district is the largest one in Iowa, but alarms rang on Monday due to unusual activities in their digital systems. With the number of schools, employees, and students under its care, the concern that this attack implies is more than understandable. Read all the details with the following lines. Activities in […]

Data of more than 200 million Twitter accounts was leaked

These days Twitter has been under the spotlight, and not in a good way. There are many reasons, but the last one is the appearance of the data of more than 200 million Twitter accounts in a forum, where the emails of the same are revealed. This incident follows in the footsteps of the news […]

Security measures to prevent cyberattacks

Nowadays, people communicate using the Internet through remote work, systems management, and online business management. Certainly, the Internet has become a necessity for people in business, students, and professionals from different areas. Therefore, it is a priority to consider security measures to protect devices, programs, and systems involved in online communications. Read the following lines! […]

Never sell a used storage system

When deciding to buy a new computer, people are most likely to sell the old one and take it to the second-hand market. Most users use an external storage system to save the files they want to keep, and later, they “delete” those files stored on the hard drive. Yet, the problem is that not […]

Preventing ransomware attacks

With the severity of ransomware attacks, the question always remains: is it possible to prevent them? In the case of such invasive malware, and with almost complete control, it seems impossible, but that’s not the case! When it comes to these attacks, it is not only losing important photos or documents, but situations that manage […]

Learn the ransomware definition

Ransomware is a popular malware affecting Windows computers or Windows systems. However, it can also affect Mac systems and iOS devices. Ransomware continues to grow; it has been recognized as viral since 2000 but, in reality, it has had many types of victims for more than 30 years. It is considered that the first attack […]

Identifying dark patterns

Dark patterns are generated using the colored buttons that appear when installing programs or apps. They are also observed when entering some websites. These buttons guide the user to the one that “is most convenient for us to press.” The inconvenience occurs when the web uses the buttons to take us “where they want.” This […]

The Vice Society Cybercrime Group is the most impactful of 2022

After many studies and attacks this year, cybersecurity experts have managed to reveal that the group known as The Vice Society has had the most impact. Their movements and attacks have been concentrated in the education sector, but they have managed to attack other ones. In this article, we will talk about this group. Read: […]

The problems with Twitter continue with a data leak

Since Elon Musk took control of Twitter, the social network has been embroiled in scandal after scandal, which have only caused problems for the company. However, a data leak at the beginning of the year has brought many inconveniences, and everything seems to indicate that it will continue to cause problems with Twitter. Read the […]

Wilmers Perdigon, Bachelor of Accounting

Eagle Tech Corp has its accounting books in perfect condition, thanks to Wilmers Perdigon, who, in addition to the many functions he performs within his professional field, has been in charge of supporting the evaluations, negotiations, acquisitions, and investments that have allowed the cybersecurity company to achieve its objectives. Read: The city of Tucson reveals […]

How to shop online safely?

This December, everything revolves around family, friends, sharing and, of course, shopping of many kinds. In recent years, the latter have changed to have a great presence in the digital world. Websites, social networks, and even email have created a whole area called e-commerce. But to be sure that each transaction is carried out safely, […]