A couple of months ago ESET researchers reported the detection of a hacking campaign targeting Spanish-speaking countries, mainly Venezuela. The operators of this campaign used a malware known as BandookRead More →

A report by the security firm Lookout mentions that a group of scammers managed to trick more than 90,000 users of Android devices into buying fake apps for cryptocurrency miningRead More →

Cybersecurity specialists reported the finding of two critical vulnerabilities in PHP, a general-purpose programming language specially adapted for web development. According to the report, successful exploitation of these flaws wouldRead More →

Nowadays users can do a factory reset on their Internet of Things (IoT) devices in a very simple way to remove from the system any record that has been storedRead More →

Just a couple of weeks after a hacking group forced the deletion of files on My Book Live network storage (NAS) devices, a security report revealed some details about aRead More →

Cybersecurity specialists report the detection of a critical vulnerability in OWASP ModSecurity Core Rule Set (CRS), whose exploitation would allow threat actors to bypass security mechanisms in affected deployments, includingRead More →