Over 368 million records for sale: first data breach of 2021
ShinyHunters is a hacker commonly associated to data breaches and was particularly active during 2020. This trend seems to keep going as there are reports of a new data breachRead More →
ShinyHunters is a hacker commonly associated to data breaches and was particularly active during 2020. This trend seems to keep going as there are reports of a new data breachRead More →
A few hours ago, a leak of an unfinished version of Windows Core Polaris was reported, proving that Microsoft was working on a version of its operating system specifically designedRead More →
T-Mobile security teams revealed that the company’s systems have been affected by a data breach that would have exposed sensitive user details, including their phone numbers and call logs. TheRead More →
Thousands of people in multiple countries around the world have been receiving fraudulent phone calls offering to register for an alleged coronavirus vaccine in exchange for some money. In theRead More →
The Federal Bureau of Investigation (FBI) has issued a security alert regarding a swatting campaign that also involves the hijacking of any Internet of Things (IoT) devices available to searchRead More →
The implementation of an automated audit on IT systems is part of the essential knowledge for any cybersecurity specialist. This time, pentesting experts from the International Institute of Cyber SecurityRead More →
In 2019, a group of videogame hackers managed to break into Nintendo’s systems after compromising an employee’s computer, an incident that resulted in the leakage of source code from titlesRead More →
In a recently released report, the Cybersecurity and Infrastructure Security Agency (CISA) revealed a PowerShell-based tool that might help detect potentially compromised applications and accounts in Microsoft 365 and AzureRead More →
Cybersecurity experts report the recent finding of a credit card skimmer capable of operating on all kinds of payment platforms, including Shopify, BigCommerce, Zencart and Woocommerce. Usually this kind ofRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com