Top 10 hacking applications for Android phones
Android is, along with iOS, the world’s most popular mobile operating system and has thousands of mobile apps to perform all kinds of tasks, making it a favorite target forRead More →
Android is, along with iOS, the world’s most popular mobile operating system and has thousands of mobile apps to perform all kinds of tasks, making it a favorite target forRead More →
Zscaler’s team of researchers has detailed the finding of a new phishing campaign in which threat actors target large organizations around the world using Microsoft’s corporate image. This campaign standsRead More →
Germany’s prison system could be in serious trouble due to the carelessness of one of its employees. According to a recent report, a prison employee accidentally sent the institution’s securityRead More →
Although advances in cryptography are continuous and considerable, researchers are always working on developing methods to decipher even the most advanced technologies. This time, ethical hacking specialists from the InternationalRead More →
Cybersecurity specialists revealed that the information of more than 500,000 Singapore Airlines frequent flyers was compromised in an incident related to SITA, an air communications and IT provider. This isRead More →
The US Department of Justice (DOJ) announced the arrest and conviction of the 38 year-old Romanian citizen Costel Aparaschievi, accused of banking fraud and multiple identity theft offences. Bruce Brandler,Read More →
Currently there are multiple varieties of tools for pentesting work, mainly for scanning the target system. This time, pentesting experts from the International Institute of Cyber Security (IICS) will showRead More →
Cybersecurity specialists reported the finding of a critical vulnerability in Dell EMC OpenManage Server Administrator, a software agent that provides a complete solution for system management. According to the report,Read More →
An Oxfam Australia representative confirmed that its IT area was affected by a data breach incident possibly caused by unauthorized access to a database containing information from thousands of peopleRead More →
© 2026 All Rights Reserved
info@iicybersecurity.com