Data breach affects the biggest online firearms store
A recent cybersecurity report mentions that a hacker managed to download and post the database of Guns.com, one of the leading online platforms for the purchase and sale of firearms;Read More →
A recent cybersecurity report mentions that a hacker managed to download and post the database of Guns.com, one of the leading online platforms for the purchase and sale of firearms;Read More →
Cybersecurity researchers report that it is possible to use specially crafted Wireshark packages to deliver malware under certain conditions, especially when a target user double-clicks the URL fields of aRead More →
Azure DevOps Serve is a comprehensive solution developed by Microsoft for versioning, report collection, and tracking for collaboration on software development projects. The product is available as a standalone application,Read More →
In unprecedented events, Oracle Cloud services worldwide collapsed on Thursday morning. According to initial reports, this incident would have affected a large number of Oracle sites, which were no longerRead More →
European law enforcement agencies made multiple arrests thanks to a joint operation involving the monitoring of some encrypted communication channels due to the hacking of the Sky ECC network, primarilyRead More →
A newly detected phishing variant relies on sending fake copyright claims to remove content. If potential victims fall into the trap, it will trigger a malware infection that could compromiseRead More →
Linus Torvalds, the main developer and maintainer of the Linux kernel, issued a security alert via email recommending developers to abandon the first candidate version of the Linux 5.12 kernelRead More →
A Sophos security report details the finding of at least 4,000 fake libraries in the PyPI repository, all uploaded by a user identified as Remind Supply Chain Risks, These librariesRead More →
Android is, along with iOS, the world’s most popular mobile operating system and has thousands of mobile apps to perform all kinds of tasks, making it a favorite target forRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com