NEW ZOOM MALWARE THAT CAN RECORD MEETINGS
The most widely used but yet the most vulnerable video conferencing app ZOOM has now come up with a new variant of attack that can escalate the attendee’s permission inRead More →
The most widely used but yet the most vulnerable video conferencing app ZOOM has now come up with a new variant of attack that can escalate the attendee’s permission inRead More →
A recently released report by security researcher Adam Chester details a new method for attacking Azure cloud deployments; So far there is no known method to fix this vulnerability, soRead More →
Cybersecurity incidents are so common that sometimes companies face more than one inconvenience at a time. Just a couple of days after revealing a malware infection, the cybersecurity company CognizantRead More →
Just days after Microsoft released its update package for the month of April the company issued a new set of security patches to fix various vulnerabilities in the Office suiteRead More →
Cybersecurity specialists have revealed the presence of a potential security vulnerability in three backup and security software applications for Toshiba Canvio external hard drive product. For security, Toshiba advises administratorsRead More →
Few illicit activities have shown as much evolution and growth as cybercrime. According to information published by Atlas VPN, malicious hackers around the world have made more than 22 millionRead More →
A recently published investigation revealed the presence of a dangerous vulnerability that would allow a hacker to completely control a Windows system. Previously, Microsoft had revealed some details related toRead More →
A couple of weeks ago, a hacker identified as “Bassterlord” claimed to have administrator access to the network of a tax collection office in India. In his post, on aRead More →
We all know that there are 5 phase of hacking namely , Reconnaissance , Scanning , Gaining access , Maintaining that access , Clear your tracks and launch your payloads.Read More →
© 2024 All Rights Reserved
info@iicybersecurity.com