Social Engineering is a set of techniques that transcend the technological realm for stealing information, using psychological and social methods to achieve it. Learn more about this modality here.
Without a doubt, SAP is one of the leaders in ERP software worldwide, more than 437,000 companies in 180 countries use a SAP system.
A security flaw in the file-sharing cloud app could have allowed attackers to use stolen credentials to bypass SMS one-time code verification requirements.
This easily exploitable vulnerability allows any non-privileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.
Discover the concept of digital resilience in companies, its importance and how to build it to guarantee the security and continuity of your business.
We tell you everything about the importance of digital transformation in companies, its benefits and how to carry it out successfully.
Discover the importance of cyber security for SMEs and how small and medium-sized businesses can protect themselves from growing cyber threats
These are the cybersecurity risks that threaten the supply chain. We tell you how to mitigate them and keep them at bay.
We tell you how AI can protect your data and systems from malicious attacks.
Investing in advanced cybersecurity solutions is not enough. The fundamental step to protect information and assets lies in cybersecurity awareness.
Telecommuting has brought about a fundamental change in many aspects, and one of them is business continuity. Here, we'll explain how to ensure it in this era.
El bot ChatGPT impulsado por IA tomó Internet este miércoles, cuando la compañía de investigación de Inteligencia Artificial (IA) OpenAI anunció el prototipo de chatbot de IA.
The group of hackers of Russian origin Conti, request $10 million from the Government of Costa Rica for the information apparently stolen from the websites of the Ministry of Finance.
These are two vulnerabilities that according to the company are probably being actively exploited by attackers.
Mientras se recomienda a las organizaciones permanecer alertas ante una posible expansión de los ciberataques, analizamos la importancia de proteger las infraestructuras críticas.
We explore different methods that can be applied to different Office suite documents to extract their content (in some cases without opening it) and determine whether or not it is malicious
The OWASP Top 10 Privacy Risks Project provides a list of the top 10 web application privacy risks and related countermeasures.
Have you ever searched for your name on Google or any other Internet search engine? Out of curiosity or for a specific purpose
Vishing is a type of attack via phone calls or voice messages that uses social engineering to trick victims into stealing sensitive information.
Experts and charities are baffled by hackers who started donating stolen money
Many Android stalkerware apps are riddled with vulnerabilities that further endanger victims and expose the privacy and security of the spying themselves.
Online dating scams often follow the same script: here's what older people should be aware of and how younger family members can help prevent them from falling victim.
ES researchers discuss new campaigns by the Gelsemium group and the complex modular malware it has used in attacks against governments, universities, electronics manufacturers, and religious organizations in East Asia and the Middle East.
Attackers managed to break into EA's systems by gaining access to a Slack channel used by the video game company and tricking a support employee into allowing them access to the network.
January of this year saw the all-time high in the number of unique phishing site URLs globally,
Here's what organizations can do today to minimize the impact of a potential ransomware attack in the future.
Millions of people do not answer calls from unknown numbers for fear that there is an illegal robocaller behind it who wants to get hold of their bank details.
INCIBE published 16 vulnerabilities, establishing 3 of critical severity and 13 of high severity, which affect multiple devices of the aforementioned brand.
The region's cybersecurity event
Most companies do some form of development in-house to streamline and optimize business processes. The problem is that many times security is not taken into account in this type of application. Let's see some characteristics of secure application development and the importance of taking them into account in the analysis