Ingeniero de sistemas y seguridad.Gamer en los ratos libres.Quiero compartir con todo sobre el mundo de la tecnología de manera mas fácil de entender y acercarla cada vez mas.
Windows 10 OOB Update Addresses Critical Message Queuing Issues Following Windows 11 Update Background on Message Queuing (MSMQ) Message Queuing (MSMQ) is a crucial component in the Microsoft ecosystem, primarily utilized by enterprises to handle background tasks and facilitate asynchronous communication between distributed applications. This system allows for the reliable transfer of messages, even under…
Critical ASUS Live Update Vulnerability Exposed: A Deep Dive Overview of the Vulnerability On December 17, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially recognized a critical security flaw affecting ASUS Live Update by including it in its Known Exploited Vulnerabilities (KEV) catalog. This action was prompted by recent indications of active exploitation…
Large-Scale AWS Crypto Mining Campaign Unleashed via Compromised IAM Credentials Introduction An alarming trend is emerging in the cybersecurity landscape, as an ongoing campaign has been identified that exploits compromised Identity and Access Management (IAM) credentials specifically within Amazon Web Services (AWS) environments. This activity not only highlights severe vulnerabilities but underscores the growing need…
SoundCloud Confirms Data Breach: User Information Compromised and VPN Service Disrupted Background and Context SoundCloud, a major player in the audio streaming industry, provides a platform for artists to upload, share, and promote their music. With over 76 million monthly active listeners, SoundCloud has become a critical space for indie musicians and content creators. However,…
VolkLocker Ransomware Flaw Exposed: Free Decryption Possible Background and Context The emergence of ransomware-as-a-service (RaaS) offerings has radically transformed the cybercrime landscape, providing even those with limited technical skills access to advanced malware tools. VolkLocker is the latest in a line of RaaS products developed by the pro-Russian hacktivist group CyberVolk, also known as GLORIAMIST.…
CISA Identifies High-Risk Sierra Wireless Router Vulnerability Subject to Active Exploitation Introduction to the Vulnerability On December 13, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added a critical vulnerability affecting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) database. The designation of CVE-2018-4063, which obtained a Common Vulnerability Scoring…
CISA Identifies Critical GeoServer XXE Vulnerability as Actively Exploited Background and Context The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical vulnerability in OSGeo’s GeoServer, drawing attention to its potential risks and the urgent need for mitigation. The vulnerability, designated as CVE-2025-58360, has been classified with a CVSS score of 8.2, indicating…
Google Ads Misused to Distribute AMOS Infostealer Malware via AI Chatbot Guides Background and Context The increasing reliance on artificial intelligence (AI) tools such as ChatGPT and Grok for various tasks has opened new avenues for cybercriminal activities. The current infestation of AMOS infostealer malware takes advantage of Google search ads, steering users towards false…
SAP Addresses Critical Vulnerabilities in December Security Updates Introduction to SAP’s Security Update On December 9, 2025, SAP released its latest security updates, addressing a total of 14 vulnerabilities present in various products. Among these, three vulnerabilities were assessed with critical severity. This release is particularly timely, as organizations worldwide prepare for year-end audits and…
JS#SMUGGLER Campaign Leverages Compromised Websites to Distribute NetSupport RAT Background and Context Cyber threats continue to evolve, becoming increasingly sophisticated and elusive to traditional cybersecurity measures. The JS#SMUGGLER campaign is a notable example of this trend, utilizing compromised websites to deliver the NetSupport Remote Access Trojan (RAT). Such tactics are not new; however, they represent…