HP has noted, in its latest global HP Wolf Security Threat Insights report on real-world cyberattacks, that the most common attacks are via files with shortcuts (LNK). In fact, they have become the most used method to threaten businesses and companies.
The technology company points out that there…
Read More...
Browsing Tag
cyberattacks
Spain is the first country with the most remote desktop attacks
During 2021, more than 51,000 million computer attacks originated in Spain through the remote desktop protocol, becoming the first country to register this type of attack. This was reported by the computer security company ESET.
Computer…
Protection measures for cyberattacks with ransomware
Ransomware is a type of software that intentionally executes malicious actions without the user's knowledge, infecting devices and locking users out of their data or applications until those affected pay the ransom. It is currently one of…
ITNEWSLAT and Rafael Núñez present: “How to prepare a cyber attack”
On January 18 ITNEWSLAT will hold a virtual event, called "How to prepare a cyberattack", which will be attended by the director of MasQueDigital, Rafael Núñez, to provide information about cyberattacks, an increasingly common situation in…
MásQueSeguridad validates that cybercrime re-evolution will manifest itself in 2022
Cybercrime re-evolution is a concrete threat by 2022
The costliest cyberattacks in history have taken place over the past two years, with record amounts of stolen credit cards, high-tech crimes suitable for stopping companies and…
Germany would increase cybersecurity spending by 6.2 billion
The cybersecurity market is growing rapidly in Germany amid fears of extortion programs and data leaks, the digital association Bitkom reported today.
For this year, an expenditure of 6,200 million euros (7,160 million dollars) is expected…
The US proposes an international coalition to ensure cybersecurity
Joe Biden, president of the United States, highlighted the need to manage and coordinate actions with other countries that allow "guaranteeing the cybersecurity measures" necessary to control hackers and bad actors, who intend to use new…
Microsoft failure forces US to update software
This Tuesday the United States Government has asked all the agencies as well as the rest of the users to immediately install the latest update of the security system for Microsoft's Exchange Server service as a protection measure against…
Prosegur launches crypto custody solution for institutional market
Prosegur is the first Spanish security company, founded in 1976, to be listed on the Madrid Stock Exchange (1987). It is now venturing into the crypto ecosystem with the launch of a crypto custody solution for the institutional market.
The…
Vatican uses AI to protect digitization of historical documents
The Vatican Apostolic Library has opted for Artificial Intelligence (AI) technology to protect its manuscripts and historical documents from cyberattacks. It currently has 80,000 documents, including the oldest copy of the Bible and…
Germany starts one of the largest cyber-attack trials
One of Germany's largest cybercrime trials began today in the city of Trier in relation to a cyber bunker allegedly operated by eight people in the municipality of Traben-Trarbach, in the center-east of the country.
The prosecution accuses…
How to prevent social engineering attacks
Manipulation, through various methods, is the weapon used by cybercriminals to carry out their plans: theft of passwords, identity theft, obtaining personal data, stealing money, among others.
At the base of these processes is what digital…