El 70% de los fallos explotados revelados en 2023 fueron Zero-Days
https://blog.segu-info.com.ar/2024/10/el-70-de-los-fallos-explotados.html
https://blog.segu-info.com.ar/2024/10/el-70-de-los-fallos-explotados.html
Sitios de WordPress modificados para instalar complementos dañinos
https://blog.segu-info.com.ar/2024/10/sitios-de-wordpress-modificados-para.html
https://blog.segu-info.com.ar/2024/10/sitios-de-wordpress-modificados-para.html
Acabo de ganar 1 ETH = U$S 2.700 en un token de REGALO de la empresa cripto Latamex 😍
😁3👏2😢2👍1
OJO, si creíste en esa👆 frase, eres una víctima potencial de #phishing y robo.
NADIE regala nada.
NUNCA compartas tu billeteras ni la conectes a NADA.
SMTP del correo falso: bling.]com.]br <- BLOCK
NADIE regala nada.
NUNCA compartas tu billeteras ni la conectes a NADA.
SMTP del correo falso: bling.]com.]br <- BLOCK
👍15👏6😁5
🤓Tenemos un nuevo PRIMO:
2 ^ 136279841 - 1
"Solo" tiene 41 millones de dígitos (un ZIP de 18MB)
🔗https://www.mersenne.org/primes/?press=M136279841
"Solo" tiene 41 millones de dígitos (un ZIP de 18MB)
🔗https://www.mersenne.org/primes/?press=M136279841
www.mersenne.org
Mersenne Prime Discovery - 2^136279841-1 is Prime!
GIMPS has discovered a new Mersenne prime number: 2^136279841-1 is prime! Discovered: 2024 Oct 12
👏14❤4🔥3👍1
VMware actualiza vCenter Server para solucionar la vulnerabilidad crítica de RCE
https://blog.segu-info.com.ar/2024/10/vmware-actualiza-vcenter-server-para.html
https://blog.segu-info.com.ar/2024/10/vmware-actualiza-vcenter-server-para.html
🔥6
Ataques a la cadena de suministro explotan los puntos de entrada en Python, npm y los ecosistemas de código abierto
https://blog.segu-info.com.ar/2024/10/ataques-la-cadena-de-suministro.html
https://blog.segu-info.com.ar/2024/10/ataques-la-cadena-de-suministro.html
👏3
Exploit para el nuevo ataque de retransmisión NTLM "WinReg" de Windows Server
https://blog.segu-info.com.ar/2024/10/exploit-para-el-nuevo-ataque-de.html
https://blog.segu-info.com.ar/2024/10/exploit-para-el-nuevo-ataque-de.html
🔥4👍1
FortiJump: vulnerabilidad crítica in-the-wild en Fortinet CVE-2024-47575 (PARCHEA YA!)
https://blog.segu-info.com.ar/2024/10/fortijump-vulnerabilidad-critica-in.html
https://blog.segu-info.com.ar/2024/10/fortijump-vulnerabilidad-critica-in.html
Reloj cuántico. ¿Tu organización está lista para comenzar a trabajar con PQC?
https://blog.segu-info.com.ar/2024/10/reloj-cuantico-tu-organizacion-esta.html
https://blog.segu-info.com.ar/2024/10/reloj-cuantico-tu-organizacion-esta.html
👍3❤1🔥1
Falla que permite fuerza bruta y DoS en Cisco ASA RAVPN
https://blog.segu-info.com.ar/2024/10/falla-que-permite-fuerza-bruta-y-dos-en.html
https://blog.segu-info.com.ar/2024/10/falla-que-permite-fuerza-bruta-y-dos-en.html
🔥2👍1
Hackers explotan centenas de vulnerabilidades y Zero-Days en la competencia Pwn2Own Irlanda
https://blog.segu-info.com.ar/2024/10/hackers-explotan-centenas-de.html
https://blog.segu-info.com.ar/2024/10/hackers-explotan-centenas-de.html
❤1
Estoy actualizando material de estudio para Labs Prácticos de #Hacking #CTF
¿Tienen recomendaciones?
Empiezo yo e iré actualizando a medida que me recomienden.
🔗http://overthewire.org
🔗http://rangeforce.com/
🔗http://rootinjail.com
🔗https://247ctf.com/dashboard
🔗https://alf.nu/alertl
🔗https://attackdefense.com
🔗https://capturetheflag.com.br
🔗https://capturetheflag.withgoogle.com
🔗https://cmdchallenge.com
🔗https://crackmes.one/
🔗https://ctf.hackerl01.com/
🔗https://ctf.hackthissite.org/
🔗https://ctf.komodosec.com/
🔗https://ctflearn.com/
🔗https://dockerlabs.es/
🔗https://exploit.education/
🔗https://gameofhacks.com/
🔗https://google-gruyere.appspot.com/
🔗https://hack.me/
🔗https://hackaflag.com.br
🔗https://hacking-lab.com/
🔗https://hacksplaining.com/lessons
🔗https://hackthebox.com/
🔗https://hackthebox.eu/
🔗https://hackthis.co.uk/
🔗https://hax.tor.hu/
🔗https://hellboundhackers.org/
🔗https://hstrike.com/
🔗https://immersivelabs.com/
🔗https://jwljoy.medium.com/damn-vulnerable-applications-c4e286832147
🔗https://lab.pentestit.ru/
🔗https://lnkd.in/esq9Yuv5/
🔗https://microcorruption.com/
🔗https://newbiecontest.org/
🔗https://overthewire.org/
🔗https://overthewire.org/wargames/
🔗https://parrot-ctfs.com/
🔗https://pentest.training/
🔗https://pentesterlab.com/
🔗https://picoctf.com/
🔗https://portswigger.net/web-security/all-labs
🔗https://practicalpentestlabs.com/
🔗https://pwnable.kr/play.php
🔗https://root-me.org/en/
🔗https://thehackerslabs.com
🔗https://thehackerslabs.com/
🔗https://thisislegal.com/
🔗https://tryhackme.com/classrooms
🔗https://vulnmachines.com/#challenges
🔗https://www.hackthebox.com/hacker/hacking-labs
🔗https://www.immersivelabs.com/resources/webinars/cybersecurity-ctfs-the-power-of-competition-in-building-attack-ready-humans
🔗https://www.offsec.com/labs/individual/
🔗https://www.picoctf.org/
🔗https://www.root-me.org/en/Capture-The-Flag/CTF-all-the-day/
🔗https://www.virtualhackinglabs.com/labs/penetration-testing-lab/
🔗https://www.vulnhub.com/
🔗https://www.wizlynxgroup.com/pwntilldawn-ctf/
🔗https://xss-game.appspot.com/
¿Tienen recomendaciones?
Empiezo yo e iré actualizando a medida que me recomienden.
🔗http://overthewire.org
🔗http://rangeforce.com/
🔗http://rootinjail.com
🔗https://247ctf.com/dashboard
🔗https://alf.nu/alertl
🔗https://attackdefense.com
🔗https://capturetheflag.com.br
🔗https://capturetheflag.withgoogle.com
🔗https://cmdchallenge.com
🔗https://crackmes.one/
🔗https://ctf.hackerl01.com/
🔗https://ctf.hackthissite.org/
🔗https://ctf.komodosec.com/
🔗https://ctflearn.com/
🔗https://dockerlabs.es/
🔗https://exploit.education/
🔗https://gameofhacks.com/
🔗https://google-gruyere.appspot.com/
🔗https://hack.me/
🔗https://hackaflag.com.br
🔗https://hacking-lab.com/
🔗https://hacksplaining.com/lessons
🔗https://hackthebox.com/
🔗https://hackthebox.eu/
🔗https://hackthis.co.uk/
🔗https://hax.tor.hu/
🔗https://hellboundhackers.org/
🔗https://hstrike.com/
🔗https://immersivelabs.com/
🔗https://jwljoy.medium.com/damn-vulnerable-applications-c4e286832147
🔗https://lab.pentestit.ru/
🔗https://lnkd.in/esq9Yuv5/
🔗https://microcorruption.com/
🔗https://newbiecontest.org/
🔗https://overthewire.org/
🔗https://overthewire.org/wargames/
🔗https://parrot-ctfs.com/
🔗https://pentest.training/
🔗https://pentesterlab.com/
🔗https://picoctf.com/
🔗https://portswigger.net/web-security/all-labs
🔗https://practicalpentestlabs.com/
🔗https://pwnable.kr/play.php
🔗https://root-me.org/en/
🔗https://thehackerslabs.com
🔗https://thehackerslabs.com/
🔗https://thisislegal.com/
🔗https://tryhackme.com/classrooms
🔗https://vulnmachines.com/#challenges
🔗https://www.hackthebox.com/hacker/hacking-labs
🔗https://www.immersivelabs.com/resources/webinars/cybersecurity-ctfs-the-power-of-competition-in-building-attack-ready-humans
🔗https://www.offsec.com/labs/individual/
🔗https://www.picoctf.org/
🔗https://www.root-me.org/en/Capture-The-Flag/CTF-all-the-day/
🔗https://www.virtualhackinglabs.com/labs/penetration-testing-lab/
🔗https://www.vulnhub.com/
🔗https://www.wizlynxgroup.com/pwntilldawn-ctf/
🔗https://xss-game.appspot.com/
Vulnhub
Vulnerable By Design ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
❤16👏15👍8🤯1
AI TRiSM: gestión de confianza, riesgos y seguridad de IA y chats conversacionales
https://blog.segu-info.com.ar/2024/10/ai-trism-gestion-de-confianza-riesgos-y.html
https://blog.segu-info.com.ar/2024/10/ai-trism-gestion-de-confianza-riesgos-y.html
❤1
AI TRiSM: gestión de confianza, riesgos y seguridad de IA y chats conversacionales
https://blog.segu-info.com.ar/2024/10/ai-trism-gestion-de-confianza-riesgos-y.html
https://blog.segu-info.com.ar/2024/10/ai-trism-gestion-de-confianza-riesgos-y.html
👍2👏1
Omisión de firma de controladores de Windows permite downgrade e instalación de rootkits en el kernel
https://blog.segu-info.com.ar/2024/10/omision-de-firma-de-controladors-de.html
https://blog.segu-info.com.ar/2024/10/omision-de-firma-de-controladors-de.html
🤬5🔥2👍1