• Sat. Apr 20th, 2024

David Rivas Huete

Cybersecurity - Intelligence - Privacy

Latest Data Breach

Are you on the waiting list? or you are already in the “happen” list? The compiled list of very recent Data Breach Attacks is enormous. LinkedIn was recently victim of…

Building Resilience: Ransomware

A great information directly from the National Cyber Security Centre during last CYBERUK 2021 The NCSC, is providing advisory support about Cybersecurity and Information Security Management to thr UK across…

The FBI is now dedicated to clean compromised Microsoft Exchange servers. Is this a good idea?

After a court order allowed the FBI to take action into networks of businesses affected by the malicious web shell s from hundred of systems, the US Department of Justice…

Williams F1 app Hacked

The company has stopped the plan to unveil their augmented reality app. The technology it’s a key part of the F1 industry, I would say a critical part nowadays, telemetry…

Zero-Day Vulnerability on Microsoft Exchange Server

Attackers obtained access to email accounts and from this point escalated. A total of four vulnerabilities were uncovered: CVE-2021-26855. It’s a Server-side request forgery (SSRF) an permits the attacker to…

Decrypt all the Things: TLS 1.3’s impact on network security

A great video presentation from SANS | Eric Conrad If you are interested in how RSA cryptography could be deprecated and TLS security protocol at risk, this video is for…

30K Macs Infected

And the main reason is because people still using cracked applications, Flash… Yes, you read it correctly, Flash, and clicking everywhere. Referencing Zdnet.com “According to data provided by Malwarebytes, Silver…

Source Code stolen sold by $ 7m -at least- on Dark Web

After the recent case of Ransomware attack into the polish company CD Projekt, developers of the videogames The Witcher and Cyberpunk 2077, now situations escalated one step forward with the…

The largest personal data leakage in Brazilian history

Brazilians are by law forced to inscribe their personal data in a huge Data Base accesses by the government for security and electoral purposes, but also by financial institutions and…

Lye-poisoning attack in Florida shows cybersecurity gaps in water systems

The remote access to Critical Infrastructures and his protection is one of the most unknown subject for most people, including IT professionals, however it’s a key part of National Security…