White House Cyber Director Chris Inglis to Step DownExit Tied to Completion of National Cybersecurity StrategyChris Inglis intends to step down as head of the Office...
Month: December 2022
Predicciones de ciberdelincuencia y seguridad para 2023
Predicciones de ciberdelincuencia y seguridad para 2023Los actores de amenazas continúan adaptándose a las últimas tecnologías, prácticas e incluso leyes de privacidad de datos, y depende...
Microsoft detalla la vulnerabilidad de omisión de Gatekeeper en sistemas Apple macOS
Microsoft detalla la vulnerabilidad de omisión de Gatekeeper en sistemas Apple macOSMicrosoft ha revelado detalles de una falla de seguridad ahora parcheada en Apple macOS que...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN Authorization Bypass Vulnerability
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN Authorization Bypass VulnerabilityA vulnerability in the authentication and authorization flows for VPN connections in Cisco...
SHA-1 ha muerto (NIST lo anuncia oficialmente)
SHA-1 ha muerto (NIST lo anuncia oficialmente)El algoritmo SHA-1, uno de los primeros métodos ampliamente utilizados para proteger y cifrar la información, ha llegado al final...
Cisco IOS Software for Cisco Integrated Services Routers Generation 2 Denial of Service Vulnerability
Cisco IOS Software for Cisco Integrated Services Routers Generation 2 Denial of Service VulnerabilityA vulnerability in the implementation of a protocol in Cisco Integrated Services Routers...
Godfather Android Banking Trojan Steals Through Mimicry
Godfather Android Banking Trojan Steals Through MimicryTrojan Impersionates More than 400 Financial and Crypto Exchange AppsA banking Trojan is on a rampage thanks to its ability...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Denial of Service Vulnerability
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Denial of Service VulnerabilityA vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco...
Godfather Android Banking Trojan Steals Through Mimicry
Godfather Android Banking Trojan Steals Through MimicryTrojan Impersionates More than 400 Financial and Crypto Exchange AppsA banking Trojan is on a rampage thanks to its ability...
Zelensky Makes Case for Ukrainian Support in Washington Trip
Zelensky Makes Case for Ukrainian Support in Washington TripU.S. Quietly Strengthens Ukrainian Cyber DefensesUkrainian President Volodymyr Zelensky made a historic visit to Washington in a bid...
El gusano Raspberry Robin ataca de nuevo y se dirige a los sistemas gubernamentales y de telecomunicaciones
El gusano Raspberry Robin ataca de nuevo y se dirige a los sistemas gubernamentales y de telecomunicacionesEl gusano Raspberry Robin se ha utilizado en ataques contra...
Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability
Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service VulnerabilityA vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS...
El FBI advierte sobre anuncios en motores de búsqueda que impulsan malware y phishing
El FBI advierte sobre anuncios en motores de búsqueda que impulsan malware y phishingEl FBI advierte que los actores de amenazas están utilizando anuncios de motores...
Cisco IOS Software for Cisco Industrial Ethernet Switches PROFINET Denial of Service Vulnerability
Cisco IOS Software for Cisco Industrial Ethernet Switches PROFINET Denial of Service VulnerabilityA vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for...
Zelensky Makes Case for Ukrainian Support in Washington Trip
Zelensky Makes Case for Ukrainian Support in Washington TripU.S. Quietly Strengthens Ukrainian Cyber DefensesUkrainian President Volodymyr Zelensky made a historic visit to Washington in a bid...
Cisco IOS and Cisco IOS XE Software UDP Packet Processing Denial of Service Vulnerability
Cisco IOS and Cisco IOS XE Software UDP Packet Processing Denial of Service VulnerabilityA vulnerability in the UDP processing code of Cisco IOS and Cisco IOS...
Cisco IOS and IOS XE Software DHCP Remote Code Execution Vulnerability
Cisco IOS and IOS XE Software DHCP Remote Code Execution VulnerabilityThe DHCP relay subsystem of Cisco IOS and Cisco IOS XE Software contains a vulnerability that...
Guardian Ransomware Attack May Presage Holiday Blitzkrieg
Guardian Ransomware Attack May Presage Holiday BlitzkriegExpert: Victims More Likely to Pay Quickly to 'Start Recovery and Go On Holiday'Stop the presses: Britain's Guardian media group...
Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability
Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling VulnerabilityA vulnerability in the VPN web client services component of...
Guardian Ransomware Attack May Presage Holiday Blitzkrieg
Guardian Ransomware Attack May Presage Holiday BlitzkriegExpert: Victims More Likely to Pay Quickly to 'Start Recovery and Go On Holiday'Stop the presses: Britain's Guardian media group...
Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service Vulnerability
Cisco Firepower Management Center and Firepower Threat Defense Software SSH Denial of Service VulnerabilityA vulnerability in the processing of SSH connections of Cisco Firepower Management Center...
Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service Vulnerabilities
Multiple Cisco Products Snort SMB2 Detection Engine Policy Bypass and Denial of Service VulnerabilitiesMultiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the...
Top 3 Future Technologies to Look Out for In the Cybersecurity Market
Top 3 Future Technologies to Look Out for In the Cybersecurity MarketBy Saloni Walimbe, Senior Content Writer, Global Market Insights Inc. Digitization has taken the world...
Why Secure Video Conferencing is Critical for EdTech and Business Video Learning
Why Secure Video Conferencing is Critical for EdTech and Business Video LearningBy Allen Drennan, Co-Founder & CTO, Lumicademy The changing landscape of cybersecurity and the increased...
Three Critical Elements to Modernize Your Network Firewalls
Three Critical Elements to Modernize Your Network FirewallsThe new requirements for network security By Carolyn Raab, Co-Founder and Chief Product Officer, Corsa Security It is […]...
GitHub offers secret scanning for free
GitHub offers secret scanning for freeThe open source software development service has made it easier for developers using its public repositories to keep coding secrets and...
New employee checklist and default access policy
New employee checklist and default access policyOnboarding new employees and providing them with the equipment and access they need can be a complex process involving various...
Get a lifetime privacy upgrade with KeepSolid Private Browser for $29
Get a lifetime privacy upgrade with KeepSolid Private Browser for $29Protect your iOS or Android mobile device with military-grade encryption every time you go online. The...
Study: Consumer security savvy is way behind IoT threat landscape
Study: Consumer security savvy is way behind IoT threat landscapeA new Comcast study hints at a major risk to businesses, governments and public systems due to...
Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malware
Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malwareResearchers spotted a malicious package in the Python Package Index (PyPI) repository that impersonates a software...















