Mosquito the new Infostealer arrives to Mexico
Discover Mosquito: A new variant targeting Mexican businesses. Stay informed and implement proactive measures against this emerging threat.
Mosquito the new Infostealer arrives to Mexico Read More »
Discover Mosquito: A new variant targeting Mexican businesses. Stay informed and implement proactive measures against this emerging threat.
Mosquito the new Infostealer arrives to Mexico Read More »
By Gerardo Corona Ocelot Team Context After the discovery of the self-proclaimed local group “Fenix”, the Cyber Threat Intelligence team at Metabase Q has identified a malware distribution campaign attributed to a cybercriminal group in the region known as CyberCartel. CyberCartel, has been active in Mexico and other Latin American countries, including Chile, since around
Episode V: Cybercartel strikes back Read More »
Salvador Mendoza – Research and Development Director, Metabase Q // Research Summary Have you heard of AirTag by Apple? It is a tracking device developed by Apple and designed to help people find misplaced objects. However, even when Apple states that AirTag technology is solely used for tracking objects, a growing number of malicious individuals
Apple AirTags, Unwanted tracking capabilities Read More »
By Jesus Dominguez & Gerardo Corona from Ocelot Team Context ATMs are a core part of the financial system, providing users access to their money anytime at different physical locations. Over the past few years, attacks on these devices have increased in sophistication, severity, and frequency, resulting in significant consequences for both financial institutions and
FiXS the new ATM Malware in LATAM Read More »
By Bryan Gonzalez from Ocelot Team Introduction ImageMagick is a free and open-source software suite for displaying, converting, and editing image files. It can read and write over 200 image file formats and, therefore, is very common to find it in websites worldwide since there is always a need to process pictures for users’ profiles,
ImageMagick: The hidden vulnerability behind your online images Read More »