Interesting emails? They may be a phishing scam

interesting emails

Every day, millions of emails arrive at the different accounts managed by each user, from professional to personal, including backup accounts. However, through this route, it is very easy to trick anyone using interesting emails. The technique that cybercriminals use for this is a well-known one, but it is still very efficient. Learn more in […]

Cisco confirms hack last May

Cisco confirms hack

The large technology company Cisco confirmed in recent days that it was the victim of a cyberattack perpetrated last May. The confirmation comes because the Yanluowang ransomware group published a list of files stolen from Cisco. But there are many more details surrounding this attack and what has been shared these days. Read everything in […]

Microsoft blocks macros in Office; cybercriminals change their technique

Microsoft blocks macros

Microsoft, the technology giant father of the Windows system and related products, has announced that it will block macros by default in its Office suite, which has led cybercriminals to look for new ways to trick users through files. This shift in malware distribution has been a novel test of hackers’ intelligence. In today’s article, […]

Meta takes action against cyberespionage groups that abuse its Facebook platform

Meta takes action

In recent months, there have been several cases of cyberespionage in different countries that use Facebook as their means of contact. Given this, Meta takes action against them, which led to interesting discoveries about these hackers’ working methods; they were exposed in its Quarterly Adversarial Threat Report. Read the details in the following lines! Read: […]

Risks of connecting to a public WiFi network

public WiFi network

Public WiFi networks are gaining more ground every day, something understandable when you notice that many businesses use them to stand out from the competition. Apart from the fact that it is now considered good customer service to have such a network, it does not matter where you are. Now that the holiday season is […]

Emails with fake resumes are used to distribute malware

fake resumes

Every day, users receive many emails of different kinds. In corporate accounts, it is not surprising that emails arrive with attachments associated with work, so it is difficult to suspect them. However, since they are associated with the organization’s internal network, you must be careful when you open them. The latest move from cybercriminals is […]

Most common digital threats in the first half of the year

common digital threats

The ESET company released its mid-year report on the most common digital threats found during these first 6 months. Despite the increase in cases, it is worrying to see how users continue to fall for the same techniques that cybercriminals have used for several years. It also shows how Spain is the third country in […]

Travel phishing grows with the summer arrival

Travel phishing

For many users, summer is synonymous with travel and, in the north of the planet, this new season is very close. However, since it is a very recurrent topic, and one that has become a trend on the web, cybercriminals are alert to use the tourism industry and its variants to deceive the vast majority […]

Dropbox credentials stolen with a resignation letter

Dropbox

We know that cybercriminals look every day for very creative ways to deceive users; in this way, they do not think that it is a fraud when they put their credentials on the pages they access. But, in this case, it is a resignation letter that is tricking many into handing over their Dropbox service […]

Symbiote is the new malware on Linux

Symbiote

Linux is an operating system that, for a long time, had the reputation of being considered free of viruses and malware. But in recent years, cybercriminals have demonstrated their capabilities, gaining access and even attacking it with malware and ransomware. However, this time they reached a new level of attack with Symbiote, a malware that, […]