#Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
🟣 Qué es Threema, la app utilizada por el CJNG para conseguir información clasificada
🔗 https://es.wired.com/articulos/que-es-threema

Los desarrolladores de Threema afirman que la app cuenta con características que permiten “comunicarse sin dejar huellas digitales ni revelar su red personal”.

Qué es Threema, la app utilizada por el CJNG para conseguir información clasificada

Los desarrolladores de Threema afirman que la app cuenta con características que permiten “comunicarse sin dejar huellas digitales ni revelar su red personal”.

WIRED

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs
🔗 https://www.darkreading.com/cybersecurity-operations/coast-guards-cybersecurity-rules-lessons-cisos

The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, and a hybrid OT-security role.

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ 'Harmless' Global Adware Transforms Into an AV Killer
🔗 https://www.darkreading.com/cyberattacks-data-breaches/harmless-global-adware-av-killer

A benign looking update Dragon Boss pushed out in March 2025 established persistence via scheduled tasks and arranged for future payloads to be excluded from Windows Defender.

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Every Old Vulnerability Is Now an AI Vulnerability
🔗 https://www.darkreading.com/vulnerabilities-threats/every-old-vulnerability-ai-vulnerability

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones.

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Two-Factor Authentication Breaks Free from the Desktop
🔗 https://www.darkreading.com/endpoint-security/two-factor-authentication-breaks-free-from-the-desktop

Threat actors know how to bypass security systems outside of traditional IT environments. Implementing 2FA could provide a needed extra security barrier in the physical world.