How to hide a malicious word document in a PDF to avoid EDR or AV detection
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
A recently launched enterprise driven by financial gain is using a malicious Telegram bot to assist threat actors in defrauding unsuspecting victims. The criminals referred to prospective victims as MammothsRead More →
Both CloudNordic and AzeroCloud, two hosting services based in Denmark, have been hit by ransomware attacks, which have resulted in the loss of the vast majority of client data andRead More →
The Ecuadorian national election, which took place on Sunday, was hampered by problems with internet voting for residents residing outside of the country. The Ecuadorian electoral office blamed these problemsRead More →
Notification of a data breach was only recently made public by the well-known watch manufacturing business Seiko on August 20, 2023. The data breach was caused by the notoriously maliciousRead More →
An arbitrary code execution vulnerability was found in WinRAR, and it is possible to exploit this issue by opening a RAR file that has been carefully prepared. According to theRead More →
SMS Bomber attacks are becoming more prominent as a contemporary risk that has the potential to have substantial and unsettling repercussions in the field of cybersecurity, which is plagued byRead More →
This week, cleaning product manufacturer Clorox disclosed a cybersecurity issue that resulted in the company having to take a number of its systems down.Monday, the firm disclosed the event inRead More →
A buffer overflow vulnerability was discovered not too long ago in the Wi-Fi driver that Ford employs in the SYNC 3 entertainment system. Following the identification of the vulnerability, FordRead More →
© 2026 All Rights Reserved
info@iicybersecurity.com