How to hack webcams from your mobile phone using Termux
Many users are still unaware that it is possible to exploit the capabilities of their smartphone to the full with just a few slight modifications. On this occasion, mobile securityRead More →
Many users are still unaware that it is possible to exploit the capabilities of their smartphone to the full with just a few slight modifications. On this occasion, mobile securityRead More →
A couple of months ago ESET researchers reported the detection of a hacking campaign targeting Spanish-speaking countries, mainly Venezuela. The operators of this campaign used a malware known as BandookRead More →
A report by the security firm Lookout mentions that a group of scammers managed to trick more than 90,000 users of Android devices into buying fake apps for cryptocurrency miningRead More →
Cybersecurity specialists reported the finding of two critical vulnerabilities in PHP, a general-purpose programming language specially adapted for web development. According to the report, successful exploitation of these flaws wouldRead More →
Nowadays users can do a factory reset on their Internet of Things (IoT) devices in a very simple way to remove from the system any record that has been storedRead More →
Just a couple of weeks after a hacking group forced the deletion of files on My Book Live network storage (NAS) devices, a security report revealed some details about aRead More →
Cybersecurity specialists report the detection of a critical vulnerability in OWASP ModSecurity Core Rule Set (CRS), whose exploitation would allow threat actors to bypass security mechanisms in affected deployments, includingRead More →
The REvil ransomware group announced on its dark web platform the theft of a large amount of information extracted from MásMóvil, one of the most important telecommunications companies in Spain.Read More →
Multiple reports were released this week about PrintNightmare, a critical vulnerability residing in the Windows systems print service tracked as CVE-2021-1675. Apparently the company was unable to fix this flawRead More →
© 2026 All Rights Reserved
info@iicybersecurity.com