Without a doubt, SAP is one of the leaders in ERP software worldwide, more than 437,000 companies in 180 countries use a SAP system.
A security flaw in the file-sharing cloud app could have allowed attackers to use stolen credentials to bypass SMS one-time code verification requirements.
This easily exploitable vulnerability allows any non-privileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration.
El bot ChatGPT impulsado por IA tomó Internet este miércoles, cuando la compañía de investigación de Inteligencia Artificial (IA) OpenAI anunció el prototipo de chatbot de IA.
The group of hackers of Russian origin Conti, request $10 million from the Government of Costa Rica for the information apparently stolen from the websites of the Ministry of Finance.
These are two vulnerabilities that according to the company are probably being actively exploited by attackers.
Mientras se recomienda a las organizaciones permanecer alertas ante una posible expansión de los ciberataques, analizamos la importancia de proteger las infraestructuras críticas.
We explore different methods that can be applied to different Office suite documents to extract their content (in some cases without opening it) and determine whether or not it is malicious
The OWASP Top 10 Privacy Risks Project provides a list of the top 10 web application privacy risks and related countermeasures.
Have you ever searched for your name on Google or any other Internet search engine? Out of curiosity or for a specific purpose
Vishing is a type of attack via phone calls or voice messages that uses social engineering to trick victims into stealing sensitive information.
Experts and charities are baffled by hackers who started donating stolen money
Many Android stalkerware apps are riddled with vulnerabilities that further endanger victims and expose the privacy and security of the spying themselves.
Online dating scams often follow the same script: here's what older people should be aware of and how younger family members can help prevent them from falling victim.
ES researchers discuss new campaigns by the Gelsemium group and the complex modular malware it has used in attacks against governments, universities, electronics manufacturers, and religious organizations in East Asia and the Middle East.
Attackers managed to break into EA's systems by gaining access to a Slack channel used by the video game company and tricking a support employee into allowing them access to the network.
January of this year saw the all-time high in the number of unique phishing site URLs globally,
Here's what organizations can do today to minimize the impact of a potential ransomware attack in the future.
Millions of people do not answer calls from unknown numbers for fear that there is an illegal robocaller behind it who wants to get hold of their bank details.
INCIBE published 16 vulnerabilities, establishing 3 of critical severity and 13 of high severity, which affect multiple devices of the aforementioned brand.
The region's cybersecurity event
Most companies do some form of development in-house to streamline and optimize business processes. The problem is that many times security is not taken into account in this type of application. Let's see some characteristics of secure application development and the importance of taking them into account in the analysis