Noticias

view more

Noticias del mundo de la Ciberseguridad

How Zero Trust Security Makes Teleworking Possible?

Although productivity has skyrocketed, this new context of teleworking has led to a significant increase in cyberattacks and has led to the emergence of new security challenges

Leer más
FortiXDR

Fully automated incident detection, investigation and correction.

Leer más
What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes?

DDoS is short for Distributed Denial of Service, and it is a method in which cybercriminals flood a network with so much malicious traffic that it cannot operate or communicate as it normally would.

Leer más
Summary on the cyberattack on SITA's air information system

The security of SITA, an IT and communications provider that serves 90 percent of the world's airlines, has been breached by compromising the data of millions of passengers that was stored on the company's servers in the US.

Leer más
SDR and its role in cybersecurity

The need to send data or voice wirelessly between people, between machines or between people and machines has led to the development of multiple systems, technologies and protocols.

Leer más
A German lost 450,000 euros in Bitcoin believing he was competing in an Elon Musk giveaway

The scam caused him to lose a large part of his savings. It was a fraudulent sweepstakes in which an account posing as Elon Musk offered double the winnings.

Leer más
Three steps to help companies protect their corporate networks

More than 70% of data theft involved large companies and most of those attacks are perpetrated by external actors.

Leer más
Akamai MFA, a phishing-proof solution

Akamai MFA: Phishing-Proof Multi-Factor Authentication to Prevent Employee Account Theft and Data Breaks

Leer más
HIDDEN COBRA – North Korean Malicious Cyber Activity

On October 31, 2019, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government.

Leer más
Technical Comments or Questions

On August 3, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD), released a new Malware Analysis Report (MAR) on malware used by the Chinese government.

Leer más
T-Cert / Tigo Copyright©, Guatemala todos los derechos reservados.