Globetec TG
page-banner-shape-1
page-banner-shape-2

Noticias

Resumen de Ciberseguridad THN Amenazas Herramientas y Tendencias del 7 al 13 de Octubre

Hey there, it’s your weekly dose of "what the heck is going on in cybersecurity land" – and trust me, you NEED to be in the loop this time. We’ve got everything from zero-day exploits and AI gone rogue to the FBI playing crypto kingpin – it’s full of stuff they don’t 🤫 want you to know.

So let’s jump in before we get FOMO.

⚡ Threat of the Week

GoldenJackal Hacks Air-Gapped Systems: Meet

5 Pasos para Mejorar la Detección y Respuesta en un Entorno Nublado Multi-Capa

The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on "shift-left" practices—securing code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an over-reliance on a multitude of DR tools spanning

Ataques de Estados Nación Aprovechando Vulnerabilidades de Ivanti CSA para Infiltración en Redes

A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to perform a series of malicious actions.

That’s according to findings from Fortinet FortiGuard Labs, which said the vulnerabilities were abused to gain unauthenticated access to the CSA, enumerate users configured in the appliance, and attempt to access the

Vulnerabilidad Crítica de Veeam Explotada para Propagar Ransomware Akira y Fog

Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware.

Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE-2024-40711 to create a local account and deploy the ransomware.

CVE-2024-40711, rated 9.8 out of 10.0 on the

Explotaciones de OilRig en vulnerabilidad del núcleo de Windows en campaña de espionaje contra Emiratos Árabes Unidos y el Golfo

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region.

"The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities

FBI Crea Criptomoneda Falsa para Exponer Manipulación en el Mercado Cripto

The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly manipulating digital asset markets as part of a widespread fraud operation.

The law enforcement action – codenamed Operation Token Mirrors – is the result of the U.S. Federal Bureau of Investigation (FBI) taking the "unprecedented step" of creating its own

Aplicaciones de Trading Falsas Afectan a Víctimas a Nivel Mundial en la App Store de Apple y Google Play

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB.

The campaign is part of a consumer investment fraud scheme that’s also widely known as pig butchering, in which prospective victims are lured into making investments in cryptocurrency or other financial