
Eduardo Ovalle
Articles
-
Nov 26, 2024 |
securelist.com | Cristian Souza |Eduardo Ovalle |Ashley Munoz |Timofey Ezhov
IntroductionIn a recent incident response case, we dealt with a variant of the Mimic ransomware with some interesting customization features. The attackers were able to connect via RDP to the victim’s server after a successful brute force attack and then launch the ransomware. After that, the adversary was able to elevate their privileges by exploiting the CVE-2020-1472 vulnerability (Zerologon).
-
Sep 24, 2024 |
securelist.lat | Anna Larkina |Flavio Negrini |Eduardo Ovalle |Abdul Rhman Alfaifi
El rastreo web se ha convertido en un aspecto omnipresente de nuestra vida en Internet. Ya sea que naveguemos por las redes sociales o juguemos videojuegos, compremos productos o simplemente leamos artículos de noticias, el rastreo web funciona de forma discreta y silenciosa en nuestras sesiones de navegación, y cuenta con millones de procesadores en miles de centros de datos de todo el mundo funcionando sin parar y a pleno rendimiento.
-
Sep 20, 2024 |
securelist.com | Sherif Magdy |Fedor Sinitsyn |Yanis Zinchenko |Eduardo Ovalle
In the spring of 2024, posts with real people’s personal data began appearing on the -=TWELVE=- Telegram channel. Soon it was blocked for falling foul of the Telegram terms of service. The group stayed off the radar for several months, but as we investigated a late June 2024 attack, we found that it employed techniques identical to those of Twelve and relied on C2 servers linked to the threat actor. We are therefore confident that the group is still active and will probably soon resurface.
-
Jun 24, 2024 |
securelist.lat | Alexey Antonov |Anton Kivva |David Emm |Eduardo Ovalle
La potencia de cálculo de las computadoras no cesa de aumentar, lo que permite a los usuarios resolver tareas cada vez más complejas con mayor rapidez. Esto lleva, entre otras cosas, a que contraseñas que hace unos años eran imposibles de descifrar, hoy en 2024, los atacantes logren descifrarlas en cuestión de segundos.
-
May 28, 2024 |
securelist.com | Cristian Souza |Eduardo Ovalle |Dmitry Kachan |Alina Sukhanova
IT outsourcing market continues to demonstrate strong growth globally – such services are becoming increasingly popular. But along with the advantages, such as saved time and resources, delegating non-core tasks creates new challenges in terms of information security. By providing third-party companies (service providers or contractors) with access to their infrastructure, businesses increase the risk of trusted relationship attacks – T1199 in the MITRE ATT&CK classification.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →