How WeTransfer phishing attacks work?
A report by cybersecurity firm Armblox notes that a hacking group is using the image of the WeTransfer hosting system and Microsoft Excel to deploy ambitious phishing campaigns in orderRead More →
A report by cybersecurity firm Armblox notes that a hacking group is using the image of the WeTransfer hosting system and Microsoft Excel to deploy ambitious phishing campaigns in orderRead More →
Phone scams are one of the main security threats for any user, being constantly reinvented to adapt to new circumstances and more easily deceive victims. In addition to the sophisticationRead More →
A set of 9 critical vulnerabilities in pneumatic tube system (PTS) stations could put critical operations in hospitals around the world at risk. These faults, identified as PwnedPiper, reside inRead More →
As part of a class action lawsuit, executives of video conferencing platform Zoom agreed to pay compensation after an investigation concluded the platform maintained very poor security and data protectionRead More →
Cybersecurity specialist Manfred Paul revealed the details of the code for exploiting a critical vulnerability in the Linux eBPF kernel on Ubuntu devices. Tracked as CVE-2021-3490, this is a criticalRead More →
The Python Package Index (PyPI) registry removed several Python packages this week that aimed to steal users’ credit card numbers, Discord tokens, and provide code execution capabilities to threat actors.Read More →
Cryptocurrency related frauds increased alongside the growing interest on this activity and can affect even experimented users. That’s exactly what happened to Diego Romero, a digital asset enthusiast with aRead More →
A new report from the most important cybersecurity agencies in the West includes a list of the 30 vulnerabilities most exploited by state hacking groups throughout 2020. This report wasRead More →
In an unprecedented incident, California local authorities banned the technology company Dell from selling its gaming systems in this state because they exceed the limit on energy consumption set byRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com