<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercrime &#8211; Bitfinance</title>
	<atom:link href="https://bitfinance.news/en/etiqueta/cybercrime/feed/" rel="self" type="application/rss+xml" />
	<link>https://bitfinance.news</link>
	<description>Fintech &#38; new economy info</description>
	<lastBuildDate>Mon, 23 Mar 2026 11:34:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bitfinance.news/wp-content/uploads/2025/01/favicon-64.png</url>
	<title>cybercrime &#8211; Bitfinance</title>
	<link>https://bitfinance.news</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What&#8217;s happening with infostealers and credential theft? Is your digital identity at risk?</title>
		<link>https://bitfinance.news/en/whats-happening-with-infostealers-and-credential-theft-is-your-digital-identity-at-risk/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 12:30:25 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[avoid becoming the next victim]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[businesses and citizens throughout Latin America]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[David González]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[Digital Survival Guide]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Threat Reports]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[malicious attachments]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[new distribution models]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protect your information today]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Safeguarding]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[tips]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=120283</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="508" height="339" src="https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Aunque las detecciones globales bajaron 18 % en el segundo semestre de 2025, los ataques actuales son más sofisticados; destaca un interesante y oportuno análisis desde ESET" decoding="async" fetchpriority="high" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland.jpg 508w, https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland-300x200.jpg 300w" sizes="(max-width: 508px) 100vw, 508px" /></div><p>An analysis based on the latest ESET Threat Reports reveals critical changes in the infostealer ecosystem: Although global detections decreased by 18% in the second half of 2025, attacks are now more sophisticated. The use of artificial intelligence and new distribution models are redefining risk for businesses and citizens throughout Latin America. “Infostealers remain a [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/whats-happening-with-infostealers-and-credential-theft-is-your-digital-identity-at-risk/">What&#8217;s happening with infostealers and credential theft? Is your digital identity at risk?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="508" height="339" src="https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Aunque las detecciones globales bajaron 18 % en el segundo semestre de 2025, los ataques actuales son más sofisticados; destaca un interesante y oportuno análisis desde ESET" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland.jpg 508w, https://bitfinance.news/wp-content/uploads/2026/03/Robo-de-identidad.-Imagen-suministrada-por-ESET-y-Comstat-Rowland-300x200.jpg 300w" sizes="(max-width: 508px) 100vw, 508px" /></div><p style="text-align: justify;">An analysis based on the latest <em><strong>ESET Threat Reports</strong></em> reveals critical changes in the <em>infostealer </em>ecosystem: Although global detections decreased by 18% in the second half of 2025, attacks are now more sophisticated.</p>
<p style="text-align: justify;">The use of <strong>artificial intelligence and new distribution models</strong> are redefining risk for <strong>businesses and citizens throughout Latin America.</strong> “Infostealers remain a favorite tool of cybercriminals because they allow them to steal large volumes of credentials and sensitive information silently. Although we saw a decrease in the number of detections last year, we also observed an <strong>evolution in their sophistication,</strong> with better-targeted campaigns and the use of new technologies to optimize attacks,” says <strong>David González, Cybersecurity Specialist at ESET Latin America.</strong></p>
<p style="text-align: justify;">Researchers at this company, a global leader in cybersecurity, analyzed the evolution of malware, specifically this type designed to <strong>steal sensitive information such as passwords, banking data, and browser history.</strong> With the discontinuation of Agent Tesla, other families like <strong>Formbook and SnakeStealer</strong> have taken the lead in information theft.</p>
<p style="text-align: justify;">This information is of relevant interest to both experts and advanced users, as well as those with basic knowledge who are undergoing preventative education and training.</p>
<h3>Local radar alert: the threats setting the trend in our region</h3>
<p>According to ESET telemetry, <strong>these are the malware families with the greatest impact that users in Latin America should closely monitor:</strong></p>
<p><strong>– <em>Formbook (Win/Formbook)</em></strong>. This was the most identified family globally at the end of 2025, accounting for 17.3% of total detections, primarily distributed through phishing campaigns.</p>
<p><strong>– <em>Lumma Stealer (Win/Spy.LummaStealer).</em></strong> Responsible for massive attacks, especially targeting users in Mexico, focused on stealing credentials and data stored in browsers.</p>
<p><strong>–<em> Agent Tesla (MSIL/Spy.AgentTesla).</em></strong> Despite a slowdown in its development, it continues to be widely distributed through malware downloaders such as CloudEyE (GuLoader).</p>
<p><strong>–<em> NGate / PhantomCard (Android/Spy.NGate).</em></strong> A mobile spyware threat primarily targeting the Brazilian banking ecosystem, with the ability to steal contacts and card data.</p>
<p><strong>– <em>Spy.Banker_(JS/Spy.Banker).</em></strong> JavaScript-based Trojans that mainly affect users of financial services and have a global detection rate of approximately 9.5%.</p>
<h4>How are these threats distributed to carry out attacks?</h4>
<p style="text-align: justify;">The main infection vectors include: <strong>Phishing and targeted spam</strong>, with <strong>malicious attachments</strong> that simulate invoices or orders. <strong>ClickFix,</strong> a social engineering technique that displays fake system errors or prompts users to activate software to make it fully functional or unlock new features in the paid version; in both cases, the goal is to convince the user to execute malicious commands. <strong>Malware downloaders, such as CloudEyE (GuLoader)</strong>, which experienced strong growth during the second half of 2025. <strong>Fraudulent websites</strong> that impersonate official stores like Google Play to distribute applications.</p>
<h3>Digital Survival Guide: What You Need to Know to Protect Your Information Today</h3>
<p style="text-align: justify;"><strong>Latin America has become a key target for cybercriminals.</strong> Don&#8217;t ignore these recommendations; they are essential tools to <strong>avoid becoming the next victim.</strong></p>
<ul style="text-align: justify;">
<li><strong>Strengthen your credentials:</strong> It is vital to improve the protection of your passwords and use early threat detection methods.</li>
<li><strong>Beware of &#8220;ClickFix&#8221;:</strong> Don&#8217;t fall for fake system errors that prompt you to run malicious commands to &#8220;activate&#8221; software.</li>
<li><strong>Mobile security:</strong> Strengthen security in mobile environments and be extremely cautious with payment technologies like <strong>NFC</strong>, which are increasingly used in financial attacks.</li>
<li><strong>Verify your downloads:</strong> Avoid websites that impersonate official stores like Google Play, as they are common vectors for distributing fraudulent applications.</li>
</ul>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram  (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>With information and reference image provided by ESET and Comstat Rowland</em></p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/whats-happening-with-infostealers-and-credential-theft-is-your-digital-identity-at-risk/">What&#8217;s happening with infostealers and credential theft? Is your digital identity at risk?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What happen if our conversations with AI chatbots are exposed or revealed?</title>
		<link>https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 12:00:50 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[5 main risks]]></category>
		<category><![CDATA[AI chatbots]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[leaks]]></category>
		<category><![CDATA[Martina López]]></category>
		<category><![CDATA[our conversations can be exposed]]></category>
		<category><![CDATA[proactive threat detection]]></category>
		<category><![CDATA[Researcher]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[security and privacy measures]]></category>
		<category><![CDATA[they are not a confidential space]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=119945</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Desde robos de identidad hasta extorsión y espionaje. ESET analiza qué datos se comparten con los chatbots, cómo pueden filtrarse y de qué manera reducir dicho riesgo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p>Interaction with chatbots (ChatGPT, Gemini, Copilot, Claude, Perplexity, among others) has come to be treated as an intimate and secure space. Emotional, psychological, work-related, and medical concerns are entrusted to them. ESET, a leading company in proactive threat detection, analyzes what type of information is typically shared with AI chatbots, how it could be exposed, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/">What happen if our conversations with AI chatbots are exposed or revealed?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Desde robos de identidad hasta extorsión y espionaje. ESET analiza qué datos se comparten con los chatbots, cómo pueden filtrarse y de qué manera reducir dicho riesgo" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2026/03/Imagen-referencial-Que-pasa-si-nuestras-conversaciones-con-los-chatbots-de-IA-quedan-expuestas-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p style="text-align: justify;">Interaction with <strong>chatbots</strong> (ChatGPT, Gemini, Copilot, Claude, Perplexity, among others) has come to be treated as an intimate and secure space. Emotional, psychological, work-related, and medical concerns are entrusted to them. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a>,</strong> a leading company in<strong> proactive threat detection</strong>, analyzes what type of information is typically shared with AI chatbots, how it could be exposed, and what the <strong>real impact of a leak could be.</strong> Furthermore, they share digital <strong>best practices for continuing to use these tools without putting oneself at risk.</strong></p>
<p style="text-align: justify;"><em>“It’s not new that many people use chatbots as if they were private spaces. Using them in this way contradicts the nature of these tools, since the platforms themselves emphasize that conversations can be <a href="https://www.welivesecurity.com/es/privacidad/chatgpt-datos-recopila-almacena-peligros/" target="_blank" rel="noopener">stored, analyzed, or reviewed</a> to improve the service. Chatbots were not designed as a confidential space, even though the conversational experience might lead one to think otherwise. While the main AI platforms claim to implement <a href="https://openai.com/es-419/policies/privacy-policy/" target="_blank" rel="noopener">security and privacy measures</a> (access controls, monitoring, infrastructure protection), this does not eliminate the risk of data breaches, nor is it synonymous with invulnerability,”</em> highlights <strong>Martina Lopez, Cybersecurity Researcher at ESET Latin America.</strong></p>
<p style="text-align: justify;">When using them as personal assistants or even advisors, personal and sensitive information is often shared almost without realizing it. This includes:</p>
<ul style="text-align: justify;">
<li><strong>Personal data.</strong> Sensitive information such as name, age, city, and country, but also daily habits: where you work, who you live with, and your family composition. This information, combined and in the wrong hands, can be dangerous.</li>
<li><strong>Work-related information.</strong> Driven by the need to &#8220;Help me improve this,&#8221; many users share internal emails, contracts, reports, presentations, business strategies, campaigns, customer and supplier details, conversations, and support tickets. They also share source code and internal architectures.</li>
<li><strong>Medical, psychological, or emotional consultations.</strong> Chatbots are also perceived by many people as advisors or specialists (<a href="https://open.spotify.com/episode/08tEGYpLstxJGBUXMEEUiO" target="_blank" rel="noopener">a practice that can be dangerous</a>). Health-related issues are shared, such as symptoms, diagnoses, and medications, as well as personal matters like relationship conflicts, grief, questions they wouldn&#8217;t ask on other social media platforms, or requests for advice.</li>
<li><strong>Opinions, beliefs, and sensitive stances</strong>. Chatbots receive opinions from users with political or religious ideologies, views on companies, bosses, or colleagues, and also information that, taken out of context, can cause reputational damage.</li>
</ul>
<p style="text-align: justify;"><em>“The problem isn’t what’s shared, but rather that false sense of intimacy and privacy, which can be shattered very easily. Months of conversations build a profile that can be extremely valuable to a cyberattacker,”</em> adds Lopez from ESET.</p>
<p style="text-align: justify;">The information shared with AI chatbots can be exposed and fall into the hands of cybercriminals for various reasons. The main one is if <strong>someone gains access to the account.</strong> This can happen by accessing the password, falling victim to a <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-phishing-guia-completa-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=not-set&amp;utm_term=es" target="_blank" rel="noopener">phishing attack</a>, or using the same password for multiple services. Another reason is <a href="https://www.kcl.ac.uk/news/ai-chatbots-can-be-exploited-to-extract-more-personal-information" target="_blank" rel="noopener">manipulated chatbots</a>, which can be tricked with <em>malicious prompts</em> by cybercriminals to obtain user information. Furthermore,<strong> accepting terms and conditions without reading them</strong> is another risk, since chatbots collect and store usage information, such as history and conversations, <a href="https://news.stanford.edu/stories/2025/10/ai-chatbot-privacy-concerns-risks-research" target="_blank" rel="noopener">to train their language model</a> by default. It&#8217;s also important to consider potential <strong>security breaches, platform errors</strong> that expose user conversations and history, or if <strong>an extension or app is monitoring too much.</strong> For example, if a plugin is installed to enhance the chatbot&#8217;s capabilities and that app malfunctions, is vulnerable, or is malicious, the conversation could slip out of the main provider&#8217;s control.</p>
<h3 style="text-align: left;">The 5 key risks associated with a chatbot leak, according to ESET</h3>
<ol>
<li style="text-align: justify;"><strong>Identity theft / Social engineering:</strong> Chatbot conversations provide human context. Cyberattackers can thus obtain information about habits, interests, routines, services used, problems that transcend these, and even the tone of voice used. This allows for much <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-la-ingenieria-social/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-digital&amp;utm_term=es" target="_blank" rel="noopener">more personalized attacks</a>, through emails or messages that appear to be written by someone familiar, scams that include real-life details, or identity theft that is much harder to detect.</li>
<li style="text-align: justify;"><strong>Corporate espionage:</strong> Since many users rely on chatbots for work support, attackers can obtain confidential information such as strategies, documents, internal decisions, customer information, and pricing and/or product details. Beyond the legal risks this situation may entail, it can also represent a competitive advantage for third parties or the breach of certain contractual obligations.</li>
<li style="text-align: justify;"><strong>Reputational damage</strong>: If private opinions, professional doubts, or intimate thoughts are exposed, the consequences can range from workplace conflicts to a loss of professional credibility.</li>
<li style="text-align: justify;"><strong>Exposure of sensitive data:</strong> These types of chatbots are also used as a space for intimate consultations and often contain personal information such as symptoms, diagnoses, treatments, religious or political beliefs, and personal or family conflicts. If this information were leaked, the impact on the victim could be devastating: stigmatization, discrimination, and even emotional distress.</li>
<li style="text-align: justify;"><strong>Extortion:</strong> When a cyberattacker has access to private information, they can exert pressure through credible threats and personalized blackmail. The goal? To obtain some kind of financial gain from the victim.</li>
<li style="text-align: justify;"></li>
</ol>
<h3>A good way to reduce the impact of exposed conversations is to adopt best practices when interacting with these chatbots. A highly useful preventative checklist</h3>
<ul>
<li style="text-align: justify;">Do not share personal data (ID number, date of birth, email, phone number) is ESET&#8217;s top recommendation.</li>
<li style="text-align: justify;">Anonymize real-life situations (change names, companies, locations).</li>
<li style="text-align: justify;">Do not attach sensitive documents, confidential information, or credentials.</li>
<li style="text-align: justify;">Review privacy settings (what is saved, what is used for training).</li>
<li style="text-align: justify;">Protect your account with a strong password and two-factor authentication.</li>
<li style="text-align: justify;">Use different accounts for work and personal use.</li>
<li style="text-align: justify;">Ask yourself: Would I say this out loud in a room with strangers?</li>
</ul>
<p style="text-align: justify;"><em>“The comfort of a fluid, natural, and unjudged conversation makes us lower our guard and share information we would never publish in any other digital space. A leak of conversations exposes not only information but also routines, vulnerabilities, decisions, and emotions. However, this scenario should be taken as an invitation to understand what these platforms are and what they are not. They are not confidential spaces, personal advisors, or vaults of sensitive information. They are powerful tools, but like all technology, they require discretion, boundaries, and responsible digital habits,”</em> concludes the ESET researcher.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;">Information and image provided by ESET and Comstat Rowland</p>
<p><em><strong>Follow our news on Google!</strong></em><em> For current, interesting, and accurate information, </em><a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong><em>click here</em></strong></a><em> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong><em>X/Twitter</em></strong></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong><em>Instagram</em></strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/what-happen-if-our-conversations-with-ai-chatbots-are-exposed-or-revealed/">What happen if our conversations with AI chatbots are exposed or revealed?</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Let&#8217;s reduce risks: How cybercriminals use stolen information</title>
		<link>https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 12:30:08 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[corporate and institutional data]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[personal and sensitive or private data]]></category>
		<category><![CDATA[protect yourself]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[reduce risk]]></category>
		<category><![CDATA[Safeguard]]></category>
		<category><![CDATA[suggestions]]></category>
		<category><![CDATA[theft]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=118842</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p>For cybercriminals, information represents money, an access point, and also a tool for committing new crimes. This is why personal and sensitive or private data, such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="985" height="553" src="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET analiza e informa sobre la utilización maliciosa de los datos sensibles y/o confidenciales robados, uno de los botines predilectos del cibercrimen, algo que debemos prevenir y frente a lo cual resguardarnos" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R.jpg 985w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-300x168.jpg 300w, https://bitfinance.news/wp-content/uploads/2026/01/Imagen-referencial-¿Que-hacen-los-cibercriminales-con-la-informacion-que-roban-Suministrada-por-ESET-y-Comstat-R-768x431.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></div><p style="text-align: justify;">For <strong>cybercriminals,</strong> information represents money, an access point, and also a tool for committing new crimes. This is why <strong>personal and sensitive or private data,</strong> such as full names, contact information, credit card numbers and banking credentials, health data, social media and service login credentials, among others, have become one of the most coveted targets for malicious actors. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading international company in proactive threat detection, analyzes <strong>what cybercriminals do once they obtain stolen information.</strong></p>
<h2 style="text-align: left;">Most common actions</h2>
<p style="text-align: justify;"><strong>Selling it on underground forums:</strong> One of the main benefits cybercriminals derive from stolen information is simply money. Personal data has significant value for the criminal ecosystem. They primarily sell it on<strong> underground forums and Dark Web marketplaces,</strong> where personal data, login credentials, banking and financial information, corporate passwords, and any other sensitive information are sought after by other cybercriminals for use in various illegal activities.</p>
<h3 style="text-align: left;">Other crimes</h3>
<ul style="text-align: justify;">
<li><strong><a href="https://www.welivesecurity.com/la-es/2022/05/11/que-es-robo-suplantacion-de-identidad/" target="_blank" rel="noopener">Identity theft</a>:</strong> The more information cybercriminals obtain about a person, the more tools they have to create a fake digital profile and thus scam their contacts or commit cybercrimes in their name. • Financial fraud: Certain personal data facilitates access to financial resources, allowing cybercriminals to obtain illicit gains. This can range from making purchases to applying for credit cards.</li>
<li><strong>Personalized <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-phishing-guia-completa-2025/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">phishing</a> attacks:</strong> Stolen information allows cybercriminals to create much more credible and targeted phishing emails. Data such as the victim&#8217;s work email address or the company where they work can lend a false sense of authenticity to an email with malicious intent.</li>
<li><strong>Extortion of victims:</strong> Information is a very powerful tool that, in the wrong hands, can be used for extortion and blackmail. Cybercriminals often use it to pressure their victims, from a concrete threat to making confidential data public, selling it to competitors, or simply causing reputational damage. In most of these cases, their goal is to obtain money.</li>
<li><strong>Espionage and sabotage:</strong> In the business or government sector, a simple stolen password can be the gateway to internal networks, critical infrastructure, and even confidential information belonging to clients, suppliers, allies, or business partners—and that&#8217;s just the beginning.</li>
</ul>
<p style="text-align: justify;">In contrast to the points mentioned above, in these cases the objective is not monetary, but rather <strong><a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/octubre-rojo-malware-robo-documentos-secretos/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">to spy undetected</a>, accessing networks, emails, and internal communications, <a href="https://www.welivesecurity.com/la-es/2017/06/20/sistemas-industriales-en-la-mira/" target="_blank" rel="noopener">altering production or logistics processes</a>, and even deleting, modifying, or corrupting key information.</strong></p>
<p style="text-align: justify;">In this context, <strong>it becomes essential to take concrete actions to protect sensitive and confidential data, whether personal, corporate, or institutional.</strong></p>
<h4 style="text-align: left;">ESET Latin America shares recommendations to significantly reduce the risk of data being exposed or falling into the wrong hands</h4>
<ul>
<li>Protect your information: avoid sharing <a href="https://www.welivesecurity.com/la-es/2022/12/29/datos-personales-internet-como-limpiar-presencia-online/" target="_blank" rel="noopener">personal data online</a>.</li>
<li>Use <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">strong passwords</a>: they should be robust and unique for each account.</li>
<li>Activate <a href="https://www.welivesecurity.com/la-es/2022/12/22/doble-factor-autenticacion-que-es-porque-lo-necesito/" target="_blank" rel="noopener">two-factor authentication</a> on every account that allows it.</li>
<li>Keep both <a href="https://www.welivesecurity.com/la-es/2023/03/15/razones-mantener-software-dispositivos-actualizados/" target="_blank" rel="noopener">devices and software up to date</a>.</li>
<li>Have a robust and reliable <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/como-elegir-antivirus-5-puntos-clave/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=cibercrimen&amp;utm_term=es" target="_blank" rel="noopener">security solution</a>.</li>
<li>Stay up-to-date on the <a href="https://www.welivesecurity.com/es/contrasenas/contrasenas-que-tan-seguras-son/" target="_blank" rel="noopener">latest cybersecurity news</a>.</li>
</ul>
<p style="text-align: justify;">For other useful data and preventative information, visit <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>and follow them on social media @eset_ve. Also on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.instagram.com/esetla/&amp;source=gmail&amp;ust=1769512253651000&amp;usg=AOvVaw3XM_vgVucFHwwlgxBtIibu">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p><em>Information and image provided by ESET and Comstat Rowland       </em></p>
<p><strong>Follow our news on Google!</strong> For current, interesting, and accurate information, <a href="https://www.google.com/search?q=site:bitfinance.news&amp;tbm=nws&amp;tbs=sbd:1" target="_blank" rel="noopener"><strong>click here</strong></a> to see all the content on <strong>Bitfinance.news</strong>. You can also find us on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/lets-reduce-risks-how-cybercriminals-use-stolen-information/">Let&#8217;s reduce risks: How cybercriminals use stolen information</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</title>
		<link>https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 13:00:10 +0000</pubDate>
				<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Cryptocurrencies]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[2025]]></category>
		<category><![CDATA[advances]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[crypto world]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[highly specialized criminals]]></category>
		<category><![CDATA[lessons learned]]></category>
		<category><![CDATA[Research Lab]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[technical intrusions]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117602</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="556" src="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET fomenta la reflexión y analiza cómo durante el año que finaliza, pérdidas multimillonarias y ataques sofisticados pusieron a prueba la confianza en cuanto al futuro del mundo cripto" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-300x185.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-768x474.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p>The year 2025 was marked by record losses from attacks and fraud in the cryptocurrency universe. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, according to Chainalysis. Projections indicate that 2025 could end with more than $4 billion in stolen assets, an all-time high. [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/">Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="900" height="556" src="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ESET fomenta la reflexión y analiza cómo durante el año que finaliza, pérdidas multimillonarias y ataques sofisticados pusieron a prueba la confianza en cuanto al futuro del mundo cripto" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-300x185.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/BFN-Imagen-referencial-Ciberseguridad-en-el-mundo-cripto-avances-riesgos-y-aprendizajes-de-2025-Sumainistrada-por-ESET-y-Comstat-R-768x474.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></div><p style="text-align: justify;">The year 2025 was marked by record losses from attacks and fraud in the <strong>cryptocurrency universe</strong>. In the first half of the year alone, thefts totaled $2.17 billion, surpassing the total value recorded in 2024, <a href="https://investalk.bb.com.br/noticias/mercado/valor-de-criptoativos-roubados-em-2025-ja-supera-o-total-de-2024-mostra-chainalysis" target="_blank" rel="noopener">according to Chainalysis</a>. Projections indicate that <strong>2025 could end with more than $4 billion in stolen assets, an all-time high.</strong></p>
<p style="text-align: justify;"><strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET,</a> a leading company in proactive threat detection,</strong> reviews some of the major cases that occurred in 2025 and how seemingly simple vulnerabilities resulted in <strong>multimillion-dollar thefts that shook the cryptocurrency market.</strong></p>
<p style="text-align: justify;">This scenario of vulnerability contrasts sharply with the growing institutionalization of the sector, where <a href="https://bitfinance.news/en/spain-approves-law-to-end-spam-calls/" target="_blank" rel="noopener">cryptocurrency ETFs registered record inflows of $5.95 billion</a> and corporate investors like Strategy (formerly MicroStrategy) announced new Bitcoin purchases. The market, however, exposed its security weaknesses. “The BBC noted that <a href="https://www.bbc.com/mundo/articles/c78e947586eo" target="_blank" rel="noopener">the $1.5 billion attack on the Bybit exchange</a>, attributed to hackers linked to North Korea, was the largest in history, thus symbolizing this contradiction: even with regulatory and technical advances, known vulnerabilities continue to be exploited,” comments <strong>Camilo Gutiérrez Amaya, Head of the Research Lab at ESET Latin America.</strong></p>
<p style="text-align: justify;"><strong>2025 is shaping up to be a year of historic losses for the cryptocurrency market.</strong> According to <a href="https://bitfinance.news/en/meta-wins-social-media-monopoly-case/" target="_blank" rel="noopener">CertiK</a>, the industry lost nearly $2.5 billion to attacks and scams in the first six months of the year alone. <a href="https://bitfinance.news/en/hydrocarbons-sector-contributes-17-of-venezuelas-gdp/" target="_blank" rel="noopener">Chainalysis</a>, on the other hand, noted that the volume of stolen crypto assets in the same period surpassed the $2.17 billion mark recorded for all of 2024.</p>
<p style="text-align: justify;">At this rate, according to ESET, losses could exceed $4 billion by the end of the year, <strong>making 2025 the year with the largest amount of stolen assets in cryptocurrency history.</strong></p>
<h3 style="text-align: left;">Vulnerabilities that can lead to multimillion-dollar losses</h3>
<p style="text-align: justify;">ESET has analyzed the most significant incidents of the year, illustrating <strong>how vulnerabilities of different kinds can result in multimillion-dollar losses:</strong></p>
<ol>
<li><strong>Attacks on exchanges and centralized platforms (CEXs):</strong> Among the most emblematic incidents is the <a href="https://www.bbc.com/portuguese/articles/crlx21zjnn4o" target="_blank" rel="noopener">attack on Bybit</a>, which resulted in the theft of approximately $1.5 billion worth of Ethereum, the largest ever recorded in cryptocurrency history. In this case, the attackers didn&#8217;t directly breach the exchange&#8217;s servers, but rather compromised a third-party platform provider, changing the wallet address where the funds were transferred. ByBit thought it was transferring the funds to its own digital wallet, but it was sending everything to the hackers. The sophistication of the operation revealed how chains of trust and external integrations can become entry points for highly specialized criminals.</li>
<li style="text-align: justify;"><strong>Exploits in DeFi protocols:</strong> The <a href="https://www.infomoney.com.br/onde-investir/hacker-rouba-mais-de-r-500-milhoes-em-ataque-a-servico-de-criptomoedas/" target="_blank" rel="noopener">Balancer</a> attack, which caused losses of over $100 million, highlighted one of the recurring weaknesses in the <a href="https://conteudos.xpi.com.br/criptomoedas/o-que-e-defi-entenda-como-funciona-as-financas-descentralizadas/" target="_blank" rel="noopener">DeFi space</a>: errors in the code. A bug in the smart contract allowed unauthorized withdrawals, exposing how small logical flaws can be exploited to compromise an entire protocol. The impact extended to derivative projects, such as Beets Finance, which also reported losses in the millions. These incidents reinforce the importance of continuous and independent audits, a challenge for protocols that prioritize innovation and speed of launch.</li>
<li><strong>Phishing scams:</strong> While large platforms suffered coordinated attacks, individual users remained the preferred targets. Phishing scams, in which victims are tricked into voluntarily surrendering their credentials, resulted in $410 million in losses, according to <a href="https://conteudos.xpi.com.br/criptomoedas/o-que-e-defi-entenda-como-funciona-as-financas-descentralizadas/" target="_blank" rel="noopener">Certik</a>. Attacks targeting individuals are estimated to have accounted for 23.35 % of all stolen funds during the period, a sign that <a href="https://www.eset.com/latam/blog/cultura-y-seguridad-digital/que-es-la-ingenieria-social/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=seguridad-digital&amp;utm_term=es" target="_blank" rel="noopener">social engineering</a> remains as effective as technical intrusions.</li>
<li style="text-align: justify;"><strong>Historical attacks and bridge vulnerabilities:</strong> Although no major bridge-related incidents occurred in 2025, this type of attack remains one of the most destructive. The memory of the <a href="https://bitfinance.news/en/hydrocarbons-sector-contributes-17-of-venezuelas-gdp/" target="_blank" rel="noopener">2022 Ronin Bridge breach</a>, in which $600 million was stolen, remains a constant warning. These failures show how the interconnectivity between networks, essential for the scalability of the crypto ecosystem, also expands the attack surface and can turn a single code error into a systemic collapse.</li>
</ol>
<p style="text-align: justify;"><em>“Recent attacks reveal the increasing professionalization of cryptocurrency-related cybercrime. Even with the growing technical and regulatory maturity of the ecosystem, cybercriminals have shown they remain one step ahead in 2025, improving their methods, exploiting known vulnerabilities, and diversifying their targets. While the industry has matured in terms of regulation, transparency, and infrastructure, many attacks exploited human error, poorly managed integrations, and unaudited code—issues that innovation alone cannot eliminate,”</em> notes Gutierrez Amaya.</p>
<p style="text-align: justify;">ESET invites you to learn more about cybersecurity by visiting: <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventative information, also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener">https://www.eset.com/ve/</a>, and on their social media channels @eset_ve. Also on Instagram <a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>With information and reference image provided by ESET and Comstat Rowland</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-and-cryptocurrencies-advances-risks-and-lessons-learned-in-2025/">Cybersecurity and cryptocurrencies: advances, risks, and lessons learned in 2025</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Venezuela signs international agreement against cybercrime</title>
		<link>https://bitfinance.news/en/venezuela-signs-international-agreement-against-cybercrime/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 20:00:37 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[States & entities]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[High-Level Conference of the United Nations Convention against Cybercrime]]></category>
		<category><![CDATA[international agreement]]></category>
		<category><![CDATA[Ministry of Science and Technology]]></category>
		<category><![CDATA[preventing international cybercrime]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[vietnam]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=117134</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1100" height="733" src="https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Con el propósito de prevenir y combatir los delitos transnacionales en el ámbito digital, Venezuela suscribió un acuerdo con Vietnam durante la Conferencia de Alto Nivel de la Convención de las Naciones Unidas contra el Ciberdelito" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash.jpg 1100w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-1024x682.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-768x512.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div><p>Venezuela signed an international agreement against cybercrime in Vietnam during the High-Level Conference of the United Nations Convention against Cybercrime. The Ministry of Science and Technology stated that “this instrument represents a decisive step in strengthening the nation’s digital security and reinforces Venezuela’s commitment to multilateralism.” The agreement establishes the legal framework that will allow [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/venezuela-signs-international-agreement-against-cybercrime/">Venezuela signs international agreement against cybercrime</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1100" height="733" src="https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Con el propósito de prevenir y combatir los delitos transnacionales en el ámbito digital, Venezuela suscribió un acuerdo con Vietnam durante la Conferencia de Alto Nivel de la Convención de las Naciones Unidas contra el Ciberdelito" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash.jpg 1100w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-1024x682.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/11/flyd-C5pXRFEjq3w-unsplash-768x512.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></div><p style="text-align: justify;"><strong>Venezuela</strong> signed an <strong>international agreement against cybercrime in Vietnam</strong> during the High-Level Conference of the United Nations Convention against Cybercrime.</p>
<p style="text-align: justify;">The <strong>Ministry of Science and Technology</strong> stated that “this instrument represents a decisive step in strengthening the <strong>nation’s digital security</strong> and reinforces Venezuela’s commitment to multilateralism.”</p>
<p style="text-align: justify;">The agreement establishes the legal framework that will allow the South American country to intensify its capabilities to <strong>prevent and combat transnational cybercrime,</strong> in order to guarantee “the <strong>protection of citizens, critical infrastructure, and technological sovereignty.”</strong></p>
<p style="text-align: justify;">Regarding the <strong>United Nations Convention against Cybercrime, it is important to remember that it emerged in 2019,</strong> “and establishes a comprehensive legal framework to address global challenges related to non-conventional security, climate change, and sustainable development.”</p>
<p style="text-align: justify;">M.Pino</p>
<p><em>Source: <a href="https://ultimasnoticias.com.ve/tecnologia/venezuela-suscribe-convenio-internacional-contra-la-ciberdelincuencia/" target="_blank" rel="noopener">ultimasnoticias</a></em></p>
<p>(Reference image source: FlyD on Unsplash)</p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/venezuela-signs-international-agreement-against-cybercrime/">Venezuela signs international agreement against cybercrime</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity was a key focus at Fitelven 2025 with MQS and Rafael Núñez</title>
		<link>https://bitfinance.news/en/cybersecurity-was-a-key-focus-at-fitelven-2025-with-mqs-and-rafael-nunez/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 22 Sep 2025 15:15:00 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Continuous training]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity culture]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[Fitelven 2025]]></category>
		<category><![CDATA[Más que Seguridad]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Rafael Núñez Aponte]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=116148</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="661" src="https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La Feria Internacional de Telecomunicaciones concluyó de manera fructífera y fue escenario propicio para educar e informar en materia de ciberseguridad" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1-300x198.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1-768x508.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p>Venezuelans attended Fitelven 2025 in person to learn about technological innovations in the broad field of telecommunications, cybersecurity, continuous training, and prevention, with presentations by, among other specialists and experts, Rafael Núñez Aponte, Director of Más Que Seguridad. Núñez gave a masterclass on ransomware, emphasizing the importance of raising awareness and fostering a culture of [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-was-a-key-focus-at-fitelven-2025-with-mqs-and-rafael-nunez/">Cybersecurity was a key focus at Fitelven 2025 with MQS and Rafael Núñez</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1000" height="661" src="https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="La Feria Internacional de Telecomunicaciones concluyó de manera fructífera y fue escenario propicio para educar e informar en materia de ciberseguridad" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1.jpg 1000w, https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1-300x198.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Rafa-en-Fitelven-2025-ES-BFN-y-PV-1-768x508.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div><p class="MsoNormal" style="text-align: justify;">Venezuelans attended <strong>Fitelven 2025</strong> in person to learn about technological innovations in the broad field of telecommunications, cybersecurity, continuous training, and prevention, with presentations by, among other specialists and experts, <strong>Rafael Núñez Aponte,</strong> Director of <strong>Más Que Seguridad.</strong></p>
<p><iframe loading="lazy" title="Fomentando cultura de la ciberseguridad: Rafa Núñez en Fitelven 2025" width="1170" height="658" src="https://www.youtube.com/embed/xv_6oM2m2eU?wmode=transparent&amp;rel=0&amp;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;"><strong>Núñez gave a masterclass on ransomware, emphasizing the importance of raising awareness and fostering a culture of security and protection.</strong> One of the topics that most captured the audience&#8217;s attention at this edition of the event was related to banking security and the protection of online transactions, with an emphasis on online users.</span></p>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DO4CTATEWza/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">Ver esta publicación en Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DO4CTATEWza/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">Una publicación compartida por Seguridad Informática (@masqueseguridad)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Más Que Seguridad (MQS) and Rafael Núñez participated in Fitelven 2025, interacted with the media and journalists, engaged with the public, congratulated the organizers, and commended the fair for its consolidation, as well as the various exhibitors for their positive growth.</span></p>
<blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/reel/DO1dcBqEWJ4/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14">
<div style="padding: 16px;">
<p>&nbsp;</p>
<div style="display: flex; flex-direction: row; align-items: center;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"></div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"></div>
</div>
</div>
<div style="padding: 19% 0;"></div>
<div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"></div>
<div style="padding-top: 8px;">
<div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">Ver esta publicación en Instagram</div>
</div>
<div style="padding: 12.5% 0;"></div>
<div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;">
<div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"></div>
<div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"></div>
<div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"></div>
</div>
<div style="margin-left: 8px;">
<div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"></div>
<div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"></div>
</div>
<div style="margin-left: auto;">
<div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"></div>
<div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"></div>
<div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"></div>
</div>
</div>
<div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;">
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"></div>
<div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"></div>
</div>
<p>&nbsp;</p>
<p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/reel/DO1dcBqEWJ4/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">Una publicación compartida por Seguridad Informática (@masqueseguridad)</a></p>
</div>
</blockquote>
<p><script async src="//www.instagram.com/embed.js"></script></p>
<p class="MsoNormal" style="tab-stops: 45.8pt 131.65pt;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Social media and contact: <a href="https://www.instagram.com/masqueseguridad/?hl=es" target="_blank" rel="noopener"><strong>masqueseguridad</strong></a></span></p>
<figure id="attachment_116145" aria-describedby="caption-attachment-116145" style="width: 1024px" class="wp-caption alignnone"><img decoding="async" class="wp-image-116145 size-full" src="https://bitfinance.news/wp-content/uploads/2025/09/Fitelven-general-2025-1024x569.jpg.jpg" alt="The Poliedro de Caracas venue hosted Fitelven, Venezuela's largest and most important telecommunications fair." width="1024" height="569" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Fitelven-general-2025-1024x569.jpg.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/09/Fitelven-general-2025-1024x569.jpg-300x167.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Fitelven-general-2025-1024x569.jpg-768x427.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-116145" class="wp-caption-text">The Poliedro de Caracas venue hosted Fitelven, Venezuela&#8217;s largest and most important telecommunications fair</figcaption></figure>
<p>&nbsp;</p>
<p class="MsoNormal" style="tab-stops: 45.8pt 131.65pt;"><em><span lang="EN-US" style="mso-ansi-language: EN-US;">Coverage of Fitelven 2025 by EL SUMARIO media group</span></em></p>
<p class="MsoNormal" style="tab-stops: 45.8pt 131.65pt;">Video production: Jesús Ramírez / Ida Febres</p>
<p class="MsoNormal"><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;">Visit our news channel on </span></em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">Google News</span></b></em></a><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;"> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </span></em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">X/Twitter</span></b></em></a><em><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;"> and </span></em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">Instagram</span></b></em></a><b style="mso-bidi-font-weight: normal;"></b></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/cybersecurity-was-a-key-focus-at-fitelven-2025-with-mqs-and-rafael-nunez/">Cybersecurity was a key focus at Fitelven 2025 with MQS and Rafael Núñez</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investor scams on social media are on the rise with the help of artificial intelligence</title>
		<link>https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 13:00:52 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Camilo Gutiérrez Amaya]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cyberscams]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[deception]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[increase in fake ads]]></category>
		<category><![CDATA[Investor scams on social media]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[promises of profits]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Research Laboratory]]></category>
		<category><![CDATA[Safeguard]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[with the help of artificial intelligence]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=115699</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El incremento de anuncios falsos, deepfakes y promesas de ganancias busca engañar incluso a las personas más cautelosas. ESET advierte de un crecimiento del 335% en las amenazas del troyano tipo Nomani, lo que llevó al bloqueo más de 8.500 dominios relacionados" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p>Faced with financial doubts and concerns, it&#8217;s no surprise that people are looking for alternatives to make their money go further. This leads users with little investment experience to become interested and take their first steps. ESET, a leading company in proactive threat detection, warns that scammers are taking advantage of this curiosity or need [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/">Investor scams on social media are on the rise with the help of artificial intelligence</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1244" height="700" src="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El incremento de anuncios falsos, deepfakes y promesas de ganancias busca engañar incluso a las personas más cautelosas. ESET advierte de un crecimiento del 335% en las amenazas del troyano tipo Nomani, lo que llevó al bloqueo más de 8.500 dominios relacionados" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R.jpg 1244w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-1024x576.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/09/Imagen-referencial-Aumentan-las-estafas-a-inversores-en-redes-sociales-con-la-ayuda-de-la-inteligencia-artificial-Suministrada-por-ESET-y-Comstat-R-768x432.jpg 768w" sizes="(max-width: 1244px) 100vw, 1244px" /></div><p style="text-align: justify;">Faced with financial doubts and concerns, it&#8217;s no surprise that people are looking for alternatives to make their money go further. This leads users with little investment experience to become interested and take their first steps. <strong><a href="https://www.eset.com/latam/" target="_blank" rel="noopener">ESET</a></strong>, a leading company in proactive threat detection, warns that scammers are taking advantage of this curiosity or need with increasingly sophisticated scams on social media. It also warns that AI-powered scams produce fake ads, deepfakes, and promises of profits that seek to deceive even the most cautious users.</p>
<p style="text-align: justify;"><em>“Could you distinguish between a real investment ad and a fake one? It&#8217;s becoming increasingly difficult to do so. Threat actors today have various tactics to make their scams more credible, including deepfake videos generated with artificial intelligence. While there are many tactics, techniques, and procedures (TTPs) associated with this type of fraud, most begin with malicious or deceptive ads circulating on social media. They are often used as a lure to trick the victim, either into providing personal information or directly directing them to an investment scam,”</em> says <strong>Camilo Gutiérrez Amaya, Head of the ESET Latin America Research Lab.</strong></p>
<p style="text-align: justify;">According to the <a href="https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf" target="_blank" rel="noopener">FBI</a>, investment scams have been the main source of income for cybercriminals for several years. At last count, they earned nearly $6.6 billion, and that&#8217;s just from crimes reported to the federal government. This figure dwarfs the $2.8 billion earned by the second-largest scam, <a href="https://www.welivesecurity.com/2022/04/26/trouble-bec-how-stop-costliest-scam/" target="_blank" rel="noopener">business email compromise</a> (BEC).</p>
<p style="text-align: justify;">An <a href="https://bitfinance.news/en/vegetable-production-in-venezuela-increased-30/" target="_blank" rel="noopener">example of this type of campaign</a> was identified in June 2025, when Instagram ads impersonated legitimate banks. Some used tempting offers, such as high-interest accounts, in an attempt to persuade the victim to click and enter their banking information. In other cases, they used deepfake Instagram stories featuring banking investment strategists to collect personal information and/or lure them into WhatsApp groups about investment scams. A 2024 campaign spread a fake video of <a href="https://bitfinance.news/en/china-secures-oil-supplies-from-russia/" target="_blank" rel="noopener">Lionel Messi to promote supposed investments</a> through an app that promised high returns.</p>
<p style="text-align: justify;">Also in 2024, <a href="https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-threat-report-h22024.pdf#page=17" target="_blank" rel="noopener">ESET observed the Nomani Trojan campaign</a>. The ad content and the phishing websites they linked to were designed to impersonate local news outlets and other organizations. Or, it could be a generic financial-themed visual with frequently changing names like &#8220;Quantum Bumex, Immediate Mator, or Bitcoin Trader.&#8221; Some of the characteristics of the Nomani campaign (and other similar campaigns) include:</p>
<ul style="text-align: justify;">
<li>Highly localized content to attract specific regional victims.</li>
<li>Distribution via fake ads on Facebook, Instagram, X, YouTube, as well as Messenger and Threads.</li>
<li>Deepfake video testimonials potentially using celebrities, often displayed in low-quality videos and with unnatural keyword repetition.</li>
<li>Use of fake and hacked accounts to run the ads (including, in one case, an <a href="https://www.welivesecurity.com/en/scams/hijacked-hacked-youtube-channels-scams-malware/" target="_blank" rel="noopener">actor with 300,000 followers</a>).</li>
<li>Shared templates and callbacks pointing to the same hosting infrastructure.</li>
</ul>
<p style="text-align: justify;">In this campaign, according to ESET, the intended objective is to persuade the victim to provide their personal information, which the scammers use to contact them directly. They use this method to trick them into signing up for an investment scam, <a href="https://www.welivesecurity.com/en/scams/borrower-beware-common-loan-scams/" target="_blank" rel="noopener">taking out a loan</a>, or even installing remote access software on their device. <strong>ESET observed a 335% increase in Nomani threats between H1 and H2 2024, and blocked more than 8,500 related domains.</strong></p>
<p style="text-align: justify;">While these techniques seem like clear indicators of fraud, they can be much more difficult to detect, especially if you are looking for opportunities to alleviate financial pressures. ESET states that the <a href="https://www.welivesecurity.com/2022/05/12/10-reasons-why-we-fall-scams/" target="_blank" rel="noopener">continued effectiveness of these types of scams</a>, such as fraudulent financial ads, is due to the following:</p>
<ul style="text-align: justify;">
<li>Times are tough, and the prospect of quick and easy financial gain is attractive.</li>
<li>Attention spans are decreasing, especially on mobile devices, so warning signs may not be detected in time.</li>
<li>Many people are unfamiliar with the latest threat TTPs, such as the use of deepfake videos, which makes them more vulnerable.</li>
<li>Many of these threats are localized, use legitimate (hijacked) accounts, and can appear at the top of search results.</li>
<li>Banks&#8217; traditional anti-fraud mechanisms often don&#8217;t work if the manipulation is also carried out socially via telephone to invest in a fraudulent scheme.</li>
</ul>
<h3 style="text-align: left;">Investment scams are very common, and ESET points out that it&#8217;s necessary to pay attention to these warning signs</h3>
<ul>
<li style="text-align: justify;">Flashy ads (which may leverage legitimate brands) offering returns that are too good to be true or unusually high interest rates.</li>
<li style="text-align: justify;">Celebrity endorsements are often the hook to give the product a certain legitimacy. Always check if the endorsement is legitimate.</li>
<li style="text-align: justify;">Videos that don&#8217;t look entirely right, for example, with visual glitches, poor audio and video synchronization, low resolution, or robotic or overly polished voices.</li>
<li style="text-align: justify;">Pressure to act quickly and secure the investment.</li>
<li style="text-align: justify;">Guaranteed return on investment.</li>
</ul>
<p style="text-align: justify;">They also advise staying alert to warning signs, resisting the temptation to click on ads about finance or investments, even if they appear to be promoted by legitimate brands and individuals, searching online for reviews of a specific investment plan or group to verify their authenticity, not investing in financial products without having thoroughly researched them and understanding how they work, ignoring any unsolicited third-party offers, never sharing personal and/or financial information after clicking on an online ad, and always checking the information circulated with the supposedly issuing entity through official channels. Finally, <strong>use security software</strong> <strong>on all your devices </strong>from a trusted provider <a href="https://bitfinance.news/en/vegetable-production-in-venezuela-increased-30/" target="_blank" rel="noopener">like ESET</a>, which will help block scams.</p>
<p style="text-align: justify;">“In times of economic uncertainty, it&#8217;s understandable that we look for alternatives to improve our financial situation. But scammers are exploiting this very need with increasingly sophisticated tactics. Therefore, being wary of what&#8217;s easy, recognizing the warning signs, and protecting your personal data is essential to avoid falling for this type of scam,” concludes the ESET researcher. ESET invites you to learn more about cybersecurity by visiting:  <a href="https://www.welivesecurity.com/es/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.welivesecurity.com/es/&amp;source=gmail&amp;ust=1756810847233000&amp;usg=AOvVaw2ji62LZTXjdo6UzrkQHffK">https://www.welivesecurity.com/es/</a>.</p>
<p style="text-align: justify;">For other useful preventive information, it is also available in Venezuela:  <a href="https://www.eset.com/ve/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.eset.com/ve/&amp;source=gmail&amp;ust=1756810847233000&amp;usg=AOvVaw0tO0ykjxd09rJ178m-eJ5P">https://www.eset.com/ve/</a>, and on its social media channels @eset_ve. Also, available on Instagram (<a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener">@esetla</a>) and Facebook (<a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener">ESET</a>).</p>
<p style="text-align: justify;"><em>Bitfinance.News</em></p>
<p>With information and reference image provided by ESET and Comstat Rowland</p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/investor-scams-on-social-media-are-on-the-rise-with-the-help-of-artificial-intelligence/">Investor scams on social media are on the rise with the help of artificial intelligence</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ESET Security Day raised awareness about the sophistication of cybercrime</title>
		<link>https://bitfinance.news/en/eset-security-day-raised-awareness-about-the-sophistication-of-cybercrime/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Wed, 11 Jun 2025 13:00:36 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[14th Edition]]></category>
		<category><![CDATA[Carlos López]]></category>
		<category><![CDATA[Critical infrastructure]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cyberdefense]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[David González]]></category>
		<category><![CDATA[DigitalSecurity]]></category>
		<category><![CDATA[ESET]]></category>
		<category><![CDATA[ESET Latin America]]></category>
		<category><![CDATA[ESET Security Day]]></category>
		<category><![CDATA[ESET Security Day Venezuela]]></category>
		<category><![CDATA[ESET Security Day Venezuela 2025]]></category>
		<category><![CDATA[ESET Venezuela]]></category>
		<category><![CDATA[Impact on work]]></category>
		<category><![CDATA[José Luis Rangel]]></category>
		<category><![CDATA[Michele Flammia]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Sophisticated cybercrimes]]></category>
		<category><![CDATA[Technological Evolution]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=114179</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="824" height="484" src="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A-.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Este 2025, la 14º edición del evento analizó y consideró en Caracas-Venezuela “La evolución tecnológica y su impacto en el trabajo”" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A-.jpg 824w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--300x176.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--768x451.jpg 768w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--357x210.jpg 357w" sizes="(max-width: 824px) 100vw, 824px" /></div><p>The 14th edition of the ESET Security Day Venezuela event took place on Thursday, June 5th. Representatives from this company (a global leader in cybersecurity) participated, addressing various aspects of the conference&#8217;s central theme: &#8220;Exploring Change: Technological Evolution and Its Impact on Work.&#8221; Michele Flammia, General Manager of ESET Venezuela, stated that &#8220;the objective of [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-security-day-raised-awareness-about-the-sophistication-of-cybercrime/">ESET Security Day raised awareness about the sophistication of cybercrime</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="824" height="484" src="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A-.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Este 2025, la 14º edición del evento analizó y consideró en Caracas-Venezuela “La evolución tecnológica y su impacto en el trabajo”" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A-.jpg 824w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--300x176.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--768x451.jpg 768w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-destacada-BFN-1-A--357x210.jpg 357w" sizes="(max-width: 824px) 100vw, 824px" /></div><p class="MsoNormal" style="text-align: justify;"><b><span lang="EN-US">The 14th edition of the ESET Security Day Venezuela</span></b><span lang="EN-US"> event took place on Thursday, June 5th. Representatives from this company (a global leader in cybersecurity) participated, addressing various aspects of the conference&#8217;s central theme<b>: &#8220;Exploring Change: Technological Evolution and Its Impact on Work.&#8221;</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Michele Flammia</span></b><span lang="EN-US" style="mso-ansi-language: EN-US;">, General Manager of </span><a href="https://www.eset.com/ve/" target="_blank" rel="noopener"><b><span lang="EN-US" style="background: white; mso-ansi-language: EN-US;">ESET Venezuela</span></b></a><span lang="EN-US" style="mso-ansi-language: EN-US;">, stated that &#8220;the objective of the event is to <b style="mso-bidi-font-weight: normal;">raise awareness among clients and partners about current and future threats posed by cyberattackers in an increasingly digital world</b>, provide them with the tools to combat them, and also collect data on the security status of companies in order to compile the annual <b style="mso-bidi-font-weight: normal;">Security Report 2025.&#8221;</b></span></p>
<figure id="attachment_114174" aria-describedby="caption-attachment-114174" style="width: 740px" class="wp-caption alignnone"><img decoding="async" class="wp-image-114174 " src="https://bitfinance.news/wp-content/uploads/2025/06/Carlos-Lopez-y-Jose-Luis-Rangel-gerentes-en-ESET-Venezuela-abordaron-otros-aspectos-importantes-en-sus-correspondientes-presentaciones-y-junto-al-invitado-internacional-respondieron-preguntas.jpg" alt="Carlos López and José Luis Rangel, managers at ESET Venezuela, addressed other important aspects in their corresponding presentations, and together with the international guest answered questions." width="740" height="499" srcset="https://bitfinance.news/wp-content/uploads/2025/06/Carlos-Lopez-y-Jose-Luis-Rangel-gerentes-en-ESET-Venezuela-abordaron-otros-aspectos-importantes-en-sus-correspondientes-presentaciones-y-junto-al-invitado-internacional-respondieron-preguntas.jpg 626w, https://bitfinance.news/wp-content/uploads/2025/06/Carlos-Lopez-y-Jose-Luis-Rangel-gerentes-en-ESET-Venezuela-abordaron-otros-aspectos-importantes-en-sus-correspondientes-presentaciones-y-junto-al-invitado-internacional-respondieron-preguntas-300x202.jpg 300w" sizes="(max-width: 740px) 100vw, 740px" /><figcaption id="caption-attachment-114174" class="wp-caption-text">Carlos López and José Luis Rangel, managers at ESET Venezuela, addressed other important aspects in their corresponding presentations, and together with the international guest answered questions.</figcaption></figure>
<h2></h2>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Raising awareness about cybersecurity threats</span></h3>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Flammia highlighted the participation of international guest <b style="mso-bidi-font-weight: normal;">David González, Security Researcher at ESET Latin America, who began the presentations by offering an &#8220;overview of the transformation of cybersecurity, from the beginnings of computing to artificial intelligence (AI).&#8221;</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">During his presentation, González robustly reported on the evolution of digital security over three generations (1990-2000, 2000-2010, and 2010-present), highlighting in each case the prominent technologies, the main threats, the measures taken to address them, and the consequences.</span></p>
<figure id="attachment_114175" aria-describedby="caption-attachment-114175" style="width: 900px" class="wp-caption alignnone"><img decoding="async" class="wp-image-114175 size-full" src="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-2-B.jpg" alt="Eng. Michele Flammia, CEO of ESET Venezuela (Logintel)" width="900" height="506" srcset="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-2-B.jpg 900w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-2-B-300x169.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-2-B-768x432.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /><figcaption id="caption-attachment-114175" class="wp-caption-text">Eng. Michele Flammia, CEO of ESET Venezuela (Logintel)</figcaption></figure>
<p>&nbsp;</p>
<p class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Currently, the most significant risks are sophisticated cybercrimes against critical infrastructure, digital extortion, espionage, and advanced phishing</span></b><span lang="EN-US" style="mso-ansi-language: EN-US;">, among others, the Security Researcher commented and documented. He added that the <b style="mso-bidi-font-weight: normal;">use of AI is also observed, both in cybercrime and in the design of security mechanisms.</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">González indicated that, over the years analyzed, the transformation of cybersecurity has been characterized by:</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">• <b style="mso-bidi-font-weight: normal;">Constant changes</b>: New forms of attack are continually emerging.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">• <b style="mso-bidi-font-weight: normal;">Technological dependence</b>: Increased availability of sensitive information in the cloud, both at the personal, corporate, and institutional levels.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">• <b style="mso-bidi-font-weight: normal;">Permanent cycle:</b> Cyber ​​defenses reveal vulnerabilities, requiring attention and the use of <b style="mso-bidi-font-weight: normal;">threat intelligence.</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Cyber ​​protection is not only the responsibility of the technical area, but also of the entire population. Therefore, &#8220;it is crucial to foster a culture of </span></b><a href="mailto:https://www.instagram.com/eset_ve/p/C7PBpYnII-0/?img_index=1"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;">digital security</span></b></a><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;"> to recognize attacks and use tools that help anticipate a potential threat that could affect industries,&#8221;</span></b><span lang="EN-US" style="mso-ansi-language: EN-US;"> González emphasized.</span></p>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Adapting to change: Key to data security</span></h3>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">For his part, <b style="mso-bidi-font-weight: normal;">Carlos López Rodríguez,</b> <b style="mso-bidi-font-weight: normal;">ESET Venezuela&#8217;s support and training manager, addressed the topic, &#8220;How to adapt to change and not fail?.&#8221;</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">ópez Rodríguez asserted that it is <b style="mso-bidi-font-weight: normal;">essential to adapt to technological transformations and remote work,</b> which is key for today&#8217;s employees. To achieve this, it is necessary to have <b style="mso-bidi-font-weight: normal;">visibility into the actions they execute without invading their privacy</b>, raise <b style="mso-bidi-font-weight: normal;">awareness about threats,</b> and <b style="mso-bidi-font-weight: normal;">secure the identities</b> of those who connect to the corporate network, since cyberattacks are increasingly aimed at stealing sensitive company data.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">According to Carlos López, &#8220;cybercrime has evolved to destroy information, not just encrypt it,&#8221; which has led to <b style="mso-bidi-font-weight: normal;">&#8220;75% of organizations that pay a ransom not recovering it and may suffer another attack in less than two weeks.&#8221;</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">He mentioned that, currently, &#8220;cybercriminals use legitimate tools and protocols to avoid detection.&#8221; Furthermore, &#8220;cybercrimes have become professionalized by being offered as services.&#8221;</span></p>
<h3 class="MsoNormal" style="text-align: left;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Cybersecurity as a strategic investment and the importance of human talent</span></h3>
<figure id="attachment_114176" aria-describedby="caption-attachment-114176" style="width: 829px" class="wp-caption alignnone"><img decoding="async" class="wp-image-114176 size-full" src="https://bitfinance.news/wp-content/uploads/2025/06/David-Gonzalez.-Imagen-referencial-3-C.jpg" alt="David González, Security Researcher at ESET Latin America" width="829" height="882" srcset="https://bitfinance.news/wp-content/uploads/2025/06/David-Gonzalez.-Imagen-referencial-3-C.jpg 829w, https://bitfinance.news/wp-content/uploads/2025/06/David-Gonzalez.-Imagen-referencial-3-C-282x300.jpg 282w, https://bitfinance.news/wp-content/uploads/2025/06/David-Gonzalez.-Imagen-referencial-3-C-768x817.jpg 768w" sizes="(max-width: 829px) 100vw, 829px" /><figcaption id="caption-attachment-114176" class="wp-caption-text">David González, Security Researcher at ESET Latin America</figcaption></figure>
<p>&nbsp;</p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">The manager of the <b style="mso-bidi-font-weight: normal;">commercial area of ​​ESET Venezuela, José Luis Rangel</b>, also spoke at the event. He addressed <b style="mso-bidi-font-weight: normal;">important aspects focused on the topic &#8220;Change as a constant,&#8221; emphasizing the need to adapt, primarily to cybersecurity</b>, human talent management, and new ways of working.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">T</span><span lang="EN-US" style="mso-ansi-language: EN-US;">hroughout his presentation, Rangel emphasized that <b style="mso-bidi-font-weight: normal;">&#8220;current times are characterized by a data economy,&#8221; </b>where &#8220;information is one of the most important assets of organizations,&#8221; making it essential to <b style="mso-bidi-font-weight: normal;">understand cybersecurity as an investment that protects the future and technological progress.</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">He commented that all members of organizations should be involved in defining the cybersecurity strategy of the company they belong to, and therefore recommended <b style="mso-bidi-font-weight: normal;">holding events, campaigns, and training coordinated by a human talent team.</b></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">Likewise, José Luis Rangel mentioned that <b style="mso-bidi-font-weight: normal;">it is advisable for employees to be trained and informed in the use of artificial intelligence</b>, as well as to avoid inadequate security practices such as the use of weak passwords.</span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;">In the face of growing and sophisticated cybersecurity threats, <b style="mso-bidi-font-weight: normal;">ESET, as a world leader in cybersecurity, offers a wide range of advanced solutions. </b>These include tools powered by AI, machine learning, and continuous monitoring, supported by a team of experts.</span></p>
<figure id="attachment_114182" aria-describedby="caption-attachment-114182" style="width: 814px" class="wp-caption alignnone"><img decoding="async" class="wp-image-114182 size-full" src="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-Jose-Luis-Rangel-ESET-Vzla.jpg" alt="José Luis Rangel, ESET Venezuela" width="814" height="541" srcset="https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-Jose-Luis-Rangel-ESET-Vzla.jpg 814w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-Jose-Luis-Rangel-ESET-Vzla-300x199.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/06/Imagen-referencial-Jose-Luis-Rangel-ESET-Vzla-768x510.jpg 768w" sizes="(max-width: 814px) 100vw, 814px" /><figcaption id="caption-attachment-114182" class="wp-caption-text">José Luis Rangel, ESET Venezuela</figcaption></figure>
<p>&nbsp;</p>
<p class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="mso-ansi-language: EN-US;">ESET solutions</span></b><span lang="EN-US" style="mso-ansi-language: EN-US;"> are designed to effectively prevent, detect, and respond to any problem that compromises vital industry information, thus ensuring <b style="mso-bidi-font-weight: normal;">data protection</b> and business continuity.</span></p>
<p class="MsoNormal" style="tab-stops: 84.6pt;"><span lang="EN-US" style="mso-ansi-language: EN-US;">For more information, visit the ESET Venezuela website: </span><a href="file:///C:/Users/Marilin/Desktop/N%20O%20T%20A%20S/www.eset.com/ve/" target="_blank" rel="noopener"><span lang="EN-US" style="mso-ansi-language: EN-US;">www.eset.com/ve/</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;">, as well as social media: Instagram </span><a href="https://www.instagram.com/esetla/" target="_blank" rel="noopener"><span lang="EN-US" style="mso-ansi-language: EN-US;">@esetla</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;"> and Facebook </span><span style="color: blue;"><a href="https://www.facebook.com/ESETLA" target="_blank" rel="noopener"><span lang="EN-US" style="mso-ansi-language: EN-US;">ESET</span></a></span><span lang="EN-US" style="mso-ansi-language: EN-US;">.</span></p>
<h3>Audiovisual coverage</h3>
<p><iframe loading="lazy" title="14º edición del ESET Security Day Venezuela" width="1170" height="658" src="https://www.youtube.com/embed/4cIcyHUkYz0?wmode=transparent&amp;rel=0&amp;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p class="MsoNormal" style="tab-stops: 84.6pt;"><em><span lang="EN-US" style="mso-ansi-language: EN-US;">Through in-person video coverage by Grupo El Sumario and with information provided by Comstat Rowland Venezuela &#8211; Comprehensive Strategic Communications</span></em></p>
<p class="MsoNormal" style="tab-stops: 84.6pt;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;">Visit our news channel on </span><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">Google News</span></b></a><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;"> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </span><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">X/Twitter</span></b></a><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #222222; background: white; mso-ansi-language: EN-US;"> and </span><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: 'Titillium Web','serif'; color: #002c55; background: white; mso-ansi-language: EN-US; text-decoration: none; text-underline: none;">Instagram</span></b></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/eset-security-day-raised-awareness-about-the-sophistication-of-cybercrime/">ESET Security Day raised awareness about the sophistication of cybercrime</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protection against spam calls</title>
		<link>https://bitfinance.news/en/protection-against-spam-calls/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 17:00:24 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Other topics]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Google caller ID]]></category>
		<category><![CDATA[smartphone]]></category>
		<category><![CDATA[Spam calls]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=111362</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="800" src="https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El marketing a través de llamadas spam es, además de molesto, peligroso, pues permite a los ciberdelincuentes lanzar ataques de manera fácil. Activar el identificador de llamadas de Google puede ser la clave" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash.jpg 1200w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-768x512.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p>Mobile phones can become the gateway for viruses or cyberattacks through spam or malicious calls on a daily basis. Google recommends protective measures for iOS and Android that are highly effective against the incursion of hackers and other digital pirates. Specifically, they warn about the need to activate the caller ID for the Phone app, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/protection-against-spam-calls/">Protection against spam calls</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="800" src="https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El marketing a través de llamadas spam es, además de molesto, peligroso, pues permite a los ciberdelincuentes lanzar ataques de manera fácil. Activar el identificador de llamadas de Google puede ser la clave" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash.jpg 1200w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2025/01/getty-images-GUT0zoUV3yI-unsplash-768x512.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p style="text-align: justify;"><strong>Mobile phones</strong> can become the gateway for <strong>viruses or cyberattacks</strong> through <strong>spam or malicious calls</strong> on a daily basis.</p>
<p style="text-align: justify;"><strong>Google</strong> recommends protective measures for<strong> iOS and Android</strong> that are highly effective against the incursion of hackers and other digital pirates.</p>
<p style="text-align: justify;">Specifically, they warn about the need to <strong>activate the caller ID for the Phone app,</strong> which launches an alert about a possible spam call when it is received.</p>
<p style="text-align: justify;">The function helps to<strong> identify whether the incoming call is from known people or not</strong>, and whether it poses a <strong>potential threat</strong> to the user, who has the power to <strong>grant access</strong> to the call or directly <strong>block the number.</strong></p>
<p style="text-align: justify;">Through this app, it is possible to receive <strong>information about the number of the incoming call</strong> in a hidden manner in order to decide the next action regarding it.</p>
<p style="text-align: justify;">M.Pino</p>
<p><em>With information from international media</em></p>
<p>(Reference image source: Getty Images for Unsplash+)</p>
<p><em>Visit our news channel on </em><a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><em><strong>Google News</strong></em></a><em> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on </em><a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><em><strong>X/Twitter</strong></em></a><em> and </em><a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><em><strong>Instagram</strong></em></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/protection-against-spam-calls/">Protection against spam calls</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The dangers of malicious advertising in seasonal sales</title>
		<link>https://bitfinance.news/en/the-dangers-of-malicious-advertising-in-seasonal-sales/</link>
		
		<dc:creator><![CDATA[Marilin Pino]]></dc:creator>
		<pubDate>Tue, 26 Nov 2024 18:00:10 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Financial security]]></category>
		<category><![CDATA[Black Friday]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[False Advertising]]></category>
		<category><![CDATA[malvertising]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[offers]]></category>
		<category><![CDATA[online shopping]]></category>
		<category><![CDATA[victims]]></category>
		<guid isPermaLink="false">https://bitfinance.news/?p=110624</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="800" src="https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El Black Friday es una de las fechas más esperadas por los consumidores para sacar provecho de las ofertas. Sin embargo, los ciberdelincuentes buscan atrapar a sus víctimas con la llamada malvertising, o publicidad maliciosa" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash.jpg 1200w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-768x512.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p>The proximity of Black Friday encourages consumers&#8217; enthusiasm for the infinite variety of offers around the world. Online shopping is the delight of cybercriminals, who have already deployed false campaigns to trap their victims. False advertising, or malvertising, consists of false advertising campaigns that digital criminals use to distribute malware, viruses, Trojans, ransomware or spyware, [&#8230;]</p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/the-dangers-of-malicious-advertising-in-seasonal-sales/">The dangers of malicious advertising in seasonal sales</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="1200" height="800" src="https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="El Black Friday es una de las fechas más esperadas por los consumidores para sacar provecho de las ofertas. Sin embargo, los ciberdelincuentes buscan atrapar a sus víctimas con la llamada malvertising, o publicidad maliciosa" decoding="async" srcset="https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash.jpg 1200w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-300x200.jpg 300w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-1024x683.jpg 1024w, https://bitfinance.news/wp-content/uploads/2024/11/microsoft-edge-6CNB3iD8M4E-unsplash-768x512.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></div><p style="text-align: justify;">The proximity of <strong>Black Frid</strong>ay encourages consumers&#8217; enthusiasm for the infinite variety of <strong>offers</strong> around the world. Online shopping is the delight of <strong>cybercriminals,</strong> who have already <strong>deployed false campaigns to trap their victims.</strong></p>
<p style="text-align: justify;">False advertising, or malvertising, consists of <strong>false advertising</strong> campaigns that digital criminals use to <strong>distribute malware, viruses, Trojans, ransomware or spyware</strong>, among other threats.</p>
<p style="text-align: justify;">What they seek with these false campaigns is to trap buyers, steal their data and execute <strong>scams</strong> through, <strong>even, sites that users regularly visit.</strong></p>
<p style="text-align: justify;">They hide in overly tempting <strong>pop-up ads </strong>that activate a <strong>virus </strong>when you click on the information. Given the various digital threats, cybersecurity specialists recommend <strong>not providing personal data</strong> or credit cards without <strong>first verifying the veracity of the information.</strong></p>
<p style="text-align: justify;">On the other hand, give preference to the <strong>main pages of stores</strong> such as Amazon, Adidas, Walmart, Mercado Libre or Samsung, among others.</p>
<p style="text-align: justify;">Also, <strong>install a certified antivirus and activate click-to-play plugins in the browser</strong>, since these prevent Flash or Java from running without prior indication.</p>
<p style="text-align: justify;">M.Pino</p>
<p><em>(Reference image source: Microsoft Edge en Unsplash)</em></p>
<p>Visit our news channel on <a href="https://news.google.com/publications/CAAqBwgKMP_wxAswoozcAw?ceid=VE:es-419&amp;oc=3" target="_blank" rel="noopener"><strong>Google News</strong></a> and follow us to get accurate, interesting information and stay up to date with everything. You can also see our daily content on <a href="https://twitter.com/BitFinance_News" target="_blank" rel="noopener"><strong>X/Twitter</strong></a> and <a href="https://www.instagram.com/bitfinancenews/?hl=es" target="_blank" rel="noopener"><strong>Instagram</strong></a></p>
<p>La entrada <a rel="nofollow" href="https://bitfinance.news/en/the-dangers-of-malicious-advertising-in-seasonal-sales/">The dangers of malicious advertising in seasonal sales</a> apareció primero en <a rel="nofollow" href="https://bitfinance.news">Bitfinance</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
