How to hide a malicious word document in a PDF to avoid EDR or AV detection
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
An arbitrary code execution vulnerability was found in WinRAR, and it is possible to exploit this issue by opening a RAR file that has been carefully prepared. According to theRead More →
A buffer overflow vulnerability was discovered not too long ago in the Wi-Fi driver that Ford employs in the SYNC 3 entertainment system. Following the identification of the vulnerability, FordRead More →
The National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Five Eyes (Five Eyes) from a variety of nations came together to write a report that wasRead More →
Splunk has found a vulnerability that enables unauthenticated log injection, which opens the door for hostile actors to execute dangerous code on the system. This flaw was identified by Splunk.SplunkRead More →
The dangers posed by cybersecurity continue to advance, and processors are not exempt from this trend. CVE-2023-20593 is a severe security issue that affects AMD’s Zen2 class CPUs. It wasRead More →
The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has issued a warning that threat actors attempted to target critical infrastructure using a Citrix/NetScaler vulnerability known as CVE-2023-3519.Read More →
Researchers from the security company Eclypsium investigated the AMI firmware that was stolen in the 2021 ransomware attack. They discovered vulnerabilities that had been dormant for years. They are vulnerableRead More →
Over one million different attempts have been made to get into a popular WordPress plugin over the last several days, according to experts that study security. According to Wordfence, theRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com