ETC-Logo-transparente
ETC-Logo-transparente

Cisco confirms hack last May

The large technology company Cisco confirmed in recent days that it was the victim of a cyberattack perpetrated last May. The confirmation comes because the Yanluowang ransomware group published a list of files stolen from Cisco. But there are many more details surrounding this attack and what has been shared these days. Read everything in […]

Risks of connecting to a public WiFi network

Public WiFi networks are gaining more ground every day, something understandable when you notice that many businesses use them to stand out from the competition. Apart from the fact that it is now considered good customer service to have such a network, it does not matter where you are. Now that the holiday season is […]

A flaw in Rarible, an NFT Marketplace, put cryptowallets at risk

Rarible is the most used marketplace for buying and selling NFTs (non-fungible tokens), but a flaw in its systems allowed cybercriminals to take possession of users’ cryptowallets. All this thanks to malicious NFTs, a kind of phishing within the platform that deceived users. Learn more about this already fixed bug. Read: Ukrainian soldiers are hacked […]

How hackers access a system

Many organizations relied on their professional teams to keep up with security in any aspect, but we are humans, and some mistakes are bound to happen. That is where hackers attack, taking advantage of security flaws. So, how can hackers access a system? Well, the answer is a little complicated. However, here at Eagle Tech, […]

Get to know how hackers operate

Many people have this idea of a hacker working in a dark room, trying to get the information of a single individual, but the reality is way far from that scenario. Knowing how hackers operate is the first step in the path to secure information, not only personal but also from organizations and companies, which […]