
May 26, 2022
Jason Chavarría
How does this clever Linux Trojan operate?
Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

March 10, 2022
Felipe Ruiz
Highlights since just before the Russian invasion
This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

February 8, 2022
Felipe Ruiz
The emergence of WhisperGate as the first worrying sign
Although Russia has not invaded Ukraine so far, cyberattacks attributed to that world power have again been reported and could escalate into a cyberwar.

December 7, 2021
Jason Chavarría
Clues in the investigation of cyberattacks
We describe the kinds of technical traces left in the phases of a cyberattack and talk about how they may help the attribution process.

November 24, 2021
Jason Chavarría
Emotet may be back for the crown as king of malware
Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

October 11, 2021
Jason Chavarría
Android devices are catching FluBot and TangleBot
Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

August 27, 2021
Felipe Ruiz
Find out about LockBit, now in its menacing 2.0 version
In this post, you'll learn in general terms what LockBit ransomware is, what its characteristics are and why it can pose a significant threat to your business.

July 26, 2021
Felipe Zárate
The spyware that threatens the world
In this post, we will look at the software everyone is talking about: Pegasus.

July 9, 2021
Andres Roldan
Dynamic in-memory AMSI bypass
In this article we will be able to bypass AMSI using memory patching.