Security Newsletter
If it seems fishy, it might be a phishing attack
If something online seems too good to be true, it usually isn't. Phishing is one of those things that masquerade as legit and trustworthy to get a hold of your money, the kind of play-pretend I would call "phisy." The bigger the company, the more complicated the...
8 types of Indicators of Compromise (IoCs) and how to recognize them
With the help of the Indicators of Compromise, you and your team can identify malicious activity or security threats, such as data breaches, insider threats, or malware attacks. Therefore, security breaches can take different forms: unknown files on the system,...
Quick guide to 6 common types of phishing
Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud. From phreaking to phishing The term...
Top 3 ataques de phishing del año 2020
Aunque parezca increíble, seguimos cayendo en la trampa de los engaños que emplean suplantación de identidad para robar información, dinero o tomar el control de los sistemas atacados. Los ataques de phishing pueden usar una amplia variedad de aplicaciones móviles,...
$1 million stolen by scammers promoting fake $SpaceX coin “created” by Elon Musk
Lately, YouTube fans have been swindled out of almost $1 million thanks to a convincing fake SpaceX crypto-coin campaign through a popular decentralized finance protocol called Uniswap. Who started the fake SpaceX coins ads? This year in early May, many scammers...
Massive LinkedIn breach: 700M users’ data exposed
After a similar incident in April, in which a jaw-dropping 500 million profiles were put up for sale online, LinkedIn suffers a second massive data breach. Reportedly, the latest incident has exposed the sensitive data of 700 million (92%) of its users. The leaked...
The aftermath of the Colonial Pipeline ransomware attack of May 7th
The aftermath of the ransomware attack carried out by the DarkSide group against Colonial Pipeline, the biggest fuel provider in the US, consisted of major disruptions throughout the US energy sector and served as a lesson in demonstrating the importance of protecting...
Ransomware victim? Here are 8 things to do after the attack
Ransomware attacks have increased recently! "Why can’t I open that document? My computer is just getting slower and slower; I need help!" It all starts with this, and then you get a call from your IT team telling you the words you were hoping not to hear: "We’ve been...
China preparing for a cyberattack with Unit 69010 against India
It's reported that China continues to make new conspiracies about India. There are times when they try to infiltrate by entering the Indian border, sometimes by raising their voice against India in international forums, and now is spying against the country through...
Europe sees massive increase in cyberattacks during COVID-19 pandemic
Cyberattacks on critical targets in Europe doubled in 2020 New EU figures reveal that the number of cybercrimes targeting crucial institutions and organizations has doubled over the course of last year, as the COVID-19 pandemic forced people to stay indoors and online...