Skip to content
  • Home
  • About us
  • Advisory Council
  • Latam CISO
  • Insights
  • Events
  • Reports
  • Contact
  • Home
  • About us
  • Advisory Council
  • Latam CISO
  • Insights
  • Events
  • Reports
  • Contact

Articles & blog

Refuerzan seguridad en Cotija, Michoacán, tras asesinato de alcaldesa por parte del CJNG

Elementos de los tres niveles de gobierno fueron desplegados en el municipio. Foto: SSP de Michoacán Tras el asesinato de Yolanda Sánchez Figueroa, alcaldesa del municipio de Cotija, Michoacán, elementos...

WhatsApp: Aplica estos cuatro pasos para tener la mejor seguridad y proteger tu cuenta

Controla quien ve tu foto de perfil con esta configuración de privacidad. (WhatsApp) Mantener tu cuenta de WhatsApp segura es muy sencillo gracias a la función de revisión de privacidad,...

El IICA resalta programa de seguridad alimentaria en Guatemala con apoyo de EE.UU.

San José, 4 jun (EFE).- El Instituto Interamericano de Cooperación para la Agricultura (IICA) resaltó este martes la importancia de un programa que busca fortalecer la seguridad alimentaria en Guatemala...

Fake Pegasus spyware source code floods dark web

Cybercriminals are exploiting the notoriety of NSO Group’s Pegasus spyware to dupe victims on the dark web, according to cybersecurity firm CloudSEK. This revelation comes just weeks after Apple warned...

LockBit no longer world’s No. 1 ransomware gang

Well-known ransomware gang LockBit has been usurped as the world’s top ransomware gang, according to a recent report from NCC Group. For the past eight months, LockBit has led the...

Tracking manual attacks may deliver zero-day previews

Differentiating between manual and bot attacks, and homing in on human ones in particular, can give security professionals a leg up on combatting fraud attempts versus corporate systems. According to...

Building an AI strategy for the modern SOC

Artificial intelligence (AI) holds significant promise to increase productivity across business functions, and cybersecurity is no exception. Arguably no area of the security operation is more poised to benefit from...

Top cybersecurity M&A deals for 2024

Cybersecurity continues to remain one of the biggest concerns in global information technology in 2024 following a year that saw security incidents continue to grow at an alarming rate. After...

Emerging ransomware groups on the rise: Who they are, how they operate

The shutdown of BlackCat (ALPHV) in March and the law enforcement disruption of LockBit infrastructure in February have created a void in the ransomware ecosystem that’s quickly being filled by...

What is spear phishing? Examples, tactics, and techniques

Spear phishing definition Spear phishing is a direct, targeted email attack aimed at specific individuals that appears to come from a trusted sender. In spear phishing, attackers often use information...

Windows Recall — a ‘privacy nightmare’?

Windows Recall, the new feature that records a user’s screen at regular intervals, has been labelled a “privacy nightmare” due to potential data privacy and security risks. Microsoft announced the generative...

Kroll cyber threat landscape report: AI assists attackers

In its frontline threat intelligence report for the first quarter of 2024, risk and financial advisory firm Kroll revealed that, as in virtually every other industry, cyber criminals are using...
Page1 Page2 Page3