Fake inheritance Nigerian scam now spreading via Telegram
A cyber security company reported the details of a fraud attempt that began with a message through Telegram from an unknown number. This is the well-known Nigerian scam. A schemeRead More →
A cyber security company reported the details of a fraud attempt that began with a message through Telegram from an unknown number. This is the well-known Nigerian scam. A schemeRead More →
It is common for security flaws to appear that affect operating systems, applications and devices in general. Sometimes they can also compromise the data of many users who use anRead More →
The Malwarebytes Threat Intelligence team has identified a new Remote Access Trojan (RAT), which they named Woody RAT, and which has been active for at least a year. This advancedRead More →
The opensource shared file server for UNIX-like systems could put thousands of installations at risk due to a critical vulnerability allowing anyone to become a domain administrator. Samba is aRead More →
VMware published entails of multiple vulnerabilities affecting following products VMware Workspace ONE Access (Access) VMware Workspace ONE Access Connector (Access Connector) VMware Identity Manager (vIDM) VMware Identity Manager Connector (vIDMRead More →
Dahua surveillance cameras are used throughout many critical infrastructure sectors such as oil & gas, power grids, telecommunications, etc. These cameras are used to oversee many production processes, providing remoteRead More →
Have I Been Pwned is a service used by those who want to verify if the password they use or their email address was exposed as a result of aRead More →
The US State Department has announced that it is offering up to $10 million as a reward for information on individuals associated with North Korea‘s notorious state-sponsored hacking groups. TheRead More →
Andrés López, a WhatsApp user whose account was hacked by criminals and more than three million pesos were stolen from his contacts. It is already known that armed robberies areRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com