Ingeniero de sistemas y seguridad.Gamer en los ratos libres.Quiero compartir con todo sobre el mundo de la tecnología de manera mas fácil de entender y acercarla cada vez mas.
SonicWall SSL VPN Devices Reportedly Compromised at Scale; Valid Credentials Suspected Summary of the incident Cybersecurity firm Huntress on Friday warned of a “widespread compromise” of SonicWall SSL VPN devices that attackers are using to access multiple customer environments. According to the alert, threat actors are authenticating into multiple accounts rapidly across compromised devices. The…
ClayRat Android Spyware Distributes via Fake WhatsApp, TikTok and Other App Lures in Russia Overview of the campaign Security researchers have identified a rapidly evolving Android spyware campaign dubbed “ClayRat” that has targeted users in Russia. According to reporting, operators behind the campaign used a mix of Telegram channels and lookalike phishing websites to entice…
ShinyHunters Escalates Extortion Against Red Hat After Customer Engagement Reports Leak What happened Enterprise software vendor Red Hat is facing an extortion campaign after the ShinyHunters criminal group posted samples of stolen customer engagement reports (CERs) on its data leak site. The leaked artifacts were described as samples from an alleged data theft and were…
Microsoft investigates Copilot failures when multiple Office apps run simultaneously Summary of the incident Microsoft is investigating a bug that causes Copilot issues when multiple Office apps are running simultaneously on the same system. Microsoft is investigating a bug that causes Copilot issues when multiple Office apps are running simultaneously on the same system. Reports…
Zimbra Zero-Day Abused via iCalendar (.ICS) Files — What Administrators Need to Know Summary of the incident Researchers monitoring for unusually large .ICS calendar attachments discovered that a flaw in Zimbra Collaboration Suite (ZCS) was actively exploited as a zero-day earlier this year. The attackers used iCalendar files to trigger the vulnerability, enabling compromise of…
Zimbra Zero‑Day Abused via Malicious iCalendar (.ICS) Attachments Summary of the discovery Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in zero-day attacks at the beginning of the year. That finding indicates attackers leveraged the iCalendar format — commonly used for meeting invites and calendar…
Leaked iPad Pro M5 Benchmark Suggests Near-Desktop Performance What the leak shows A newly leaked benchmark result, attributed to an iPad Pro running what is being described as Apple’s alleged M5 chip, indicates a substantial jump in raw performance — enough that the device approaches the speed of many desktop-class CPUs. The dataset appears limited…
OpenAI updates GPT-5 to close emotional-support gap with GPT-4o At a glance According to reporting from BleepingComputer, OpenAI has rolled out an update intended to improve GPT-5’s ability to provide emotional support. The outlet observed that GPT-5 had previously underperformed relative to GPT-4o on supportive, empathetic interactions, and that the change released today aims to…
Detour Dog Linked to DNS-Enabled Distribution of Strela Stealer via StarFish Backdoor Summary of findings Security researchers at DNS threat intelligence firm Infoblox have attributed a series of information-stealer campaigns to a threat actor tracked as “Detour Dog.” According to Infoblox, Detour Dog maintained operational control over domains that hosted the first-stage component of the…
Signal introduces SPQR to harden messaging against future quantum attacks What Signal announced Signal has unveiled a new cryptographic component called Sparse Post-Quantum Ratchet (SPQR). The company presents SPQR as an addition to its existing end-to-end encryption design intended to provide stronger resilience against the kinds of attacks that could be enabled by large-scale quantum…