By Gerardo Corona & Jesús Dominguez from Ocelot Team Context The Threat Intelligence team at Metabase Q has recently identified a new variant of a Brazilian-based Infostealer dubbed as Mosquito by Ocelot team. Initially hitting Brazil in a campaign back in July 2023, Mosquito has recently emerged in a new campaign specifically targeting businesses in […]
Every form of life has become completely extinct in different historical periods. From the extinction of dinosaurs to the glaciations and the disappearance of our fellow human ancestors. The emergence of a new link in the species chain, which has improved physically and neuronally, implies the later disappearance of the predecessor: there are no Neanderthals
If you are reading this blog, it is because you, as well as a high percentage of the population, have started to look for information through the Internet, instead of books and printed media. We have seen this use of technology increase in the last two decades, but since 2020, its growth has been exponential.
“Bullying”, “insistence”, and “deception”, are some ofthe words that characterize the digital life of children and adolescents. With theuse of social media, minors are exposed to these worrying behaviors that wemust confront. In recent years, the emergence of new social media platforms andthe subsequent strengthening of existing ones has brought great advantages forbringing people together,
We are now living adigital revolution, in which the concept The Internet of Things is very commonand a part of our lifestyle. This has brought many conveniences and advantages,for example, the ability to give new features and functionalities to a deviceinstead of having to replace it. Our devices can evolve with every update andadapt to
Explore technology abuse risks online through ten examples unveiling digital world dangers. Understanding these threats is pivotal for a safer digital environment.
Nowadays, most people are working from home and their computers. This elevates their risk when encountered with possible cyberattacks. For example, the simple fact of connecting to the public WiFi when going to work in a café or co-working space could expose us to a hack that could compromise the sensitive information on our computers.