A Credential Stuffing Attack Affected PayPal Accounts

Credential Stuffing

PayPal recently suffered a large-scale credential stuffing attack with thousands of accounts compromised with credential stuffing, a type of cyber attack which uses stolen usernames and passwords taken from other data breaches to gain access to online accounts. This article will explain Credential Stuffing and how PayPal accounts were affected by it. Read: T-Mobile suffers […]

The Des Moines school district in Iowa is the new victim of a cyberattack

Des Moines

The Des Moines school district is the largest one in Iowa, but alarms rang on Monday due to unusual activities in their digital systems. With the number of schools, employees, and students under its care, the concern that this attack implies is more than understandable. Read all the details with the following lines. Activities in […]

Preventing ransomware attacks

preventing ransomware attacks

With the severity of ransomware attacks, the question always remains: is it possible to prevent them? In the case of such invasive malware, and with almost complete control, it seems impossible, but that’s not the case! When it comes to these attacks, it is not only losing important photos or documents, but situations that manage […]

A suspect of being part of Lapsus$ was arrested in Brazil

being part of Lapsus$

On October 19, the Brazilian Federal Police arrested a fellow citizen suspected of being part of Lapsus$, the cybercriminal group that has caused great havoc during the year to important companies around the world. There are several interesting details about this arrest and the subsequent investigation. This article will show what is happening around this […]

Cybercriminals take advantage of LinkedIn’s Smart Link feature

LinkedIn’s Smart Link

Cybercriminals are always looking for clever ways to trick users into giving up their card details and other credentials. In this case, a group has been targeting users from Slovakia who use LinkedIn’s Smart Link feature, so that they trust emails with this kind of attachment. Learn all the details in the following lines. Read: […]

Hackers manage to steal millions of dollars from healthcare systems

healthcare systems

Hackers have compromised healthcare systems, as indicated by the Federal Bureau of Investigation (FBI). They warn that cybercriminals have managed to access the processors and change the route of payments to accounts they manage. This attack has become very common this year since, according to expert firms and the FBI’s cybercrime division calculations, more than […]

The Dominican Republic is targeted by the Quantum ransomware group

The Quantum ransomware group

The Caribbean island has witnessed an attack perpetrated by the Quantum ransomware group. In this case, its main objective was the Instituto Agrario Dominicano (IAD), attached to the Ministry of Agriculture. As has been observed, the institute was not prepared to face this kind of attack, and the group took advantage of this weakness to […]

Interesting emails? They may be a phishing scam

interesting emails

Every day, millions of emails arrive at the different accounts managed by each user, from professional to personal, including backup accounts. However, through this route, it is very easy to trick anyone using interesting emails. The technique that cybercriminals use for this is a well-known one, but it is still very efficient. Learn more in […]

Cisco confirms hack last May

Cisco confirms hack

The large technology company Cisco confirmed in recent days that it was the victim of a cyberattack perpetrated last May. The confirmation comes because the Yanluowang ransomware group published a list of files stolen from Cisco. But there are many more details surrounding this attack and what has been shared these days. Read everything in […]

Microsoft blocks macros in Office; cybercriminals change their technique

Microsoft blocks macros

Microsoft, the technology giant father of the Windows system and related products, has announced that it will block macros by default in its Office suite, which has led cybercriminals to look for new ways to trick users through files. This shift in malware distribution has been a novel test of hackers’ intelligence. In today’s article, […]