Dashboard » Noticias
Omar Jacobo Muñoz Veliz
José Alejandro Gago
Samuel Esteban
Felipe Barrios
Samuel Esteban
Samuel Esteban
Noticias sobre ciberseguridad
Ransomware la Amenaza Persistente
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085704Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=c331fc81f9bcc5e6a3600040cc5a4822a5a7eb0af241c0dbcaa2c2b9558e27b0)
El ransomware es un software malicioso que encripta nuestros arch..
Obteniendo las cuentas cifradas con análisis forense de memoria. LastPass
![](https://bta-plataform-prod.s3.amazonaws.com/variants/yeMxHqx1BXccLryQZsvQxHDK/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22z43Vi97d_400x400.png%22%3B%20filename%2A%3DUTF-8%27%27z43Vi97d_400x400.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085704Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f3f20d069c215278d3d17cc114f718182412deeab4ce18d3339e1602e4249ab6)
Esta publicación se me ocurrió debido a que esta semana leí la no..
Explotación de vulnerabilidades de código en Joomla(CMS)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085704Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=aded283495dee47734a2fab92daa333d35a0e16db618e1a9a6cc7d8f4a7d15f9)
Joomla es uno de los gestores de contenidos más utilizados en el ..
Reprogramando tu cerebro con Elixir
![](https://bta-plataform-prod.s3.amazonaws.com/variants/h4EqpPMeHmyACJEVyxMG6x23/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2212063705_10207273024561428_59106377850244238_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2712063705_10207273024561428_59106377850244238_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085705Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=abbc2157af14850ff3e6b06fa54d1a131a7d144cc2c1fd96095df901d26f5cdf)
Elixir es un lenguaje que se ejecuta en la máquina virtual de Erl..
Detectando Web Shells en Nuestro Servidor Web
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085705Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=4ce0995c46b2e3bcaf1d6438a2392667878b72d751a5f6034af7262ff18c5f83)
Gran cantidad de desarrolladores webs me ha preguntado constantem..
Inyección de código malicioso en aplicaciones Web(PHP)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T085705Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=4ce0995c46b2e3bcaf1d6438a2392667878b72d751a5f6034af7262ff18c5f83)
Owasp posee un TOP 10 de vulnerabilidades orientadas a aplicacion..