Fake inheritance Nigerian scam now spreading via Telegram
A cyber security company reported the details of a fraud attempt that began with a message through Telegram from an unknown number. This is the well-known Nigerian scam. A schemeRead More →
A cyber security company reported the details of a fraud attempt that began with a message through Telegram from an unknown number. This is the well-known Nigerian scam. A schemeRead More →
It is common for security flaws to appear that affect operating systems, applications and devices in general. Sometimes they can also compromise the data of many users who use anRead More →
VMware published entails of multiple vulnerabilities affecting following products VMware Workspace ONE Access (Access) VMware Workspace ONE Access Connector (Access Connector) VMware Identity Manager (vIDM) VMware Identity Manager Connector (vIDMRead More →
Dahua surveillance cameras are used throughout many critical infrastructure sectors such as oil & gas, power grids, telecommunications, etc. These cameras are used to oversee many production processes, providing remoteRead More →
Have I Been Pwned is a service used by those who want to verify if the password they use or their email address was exposed as a result of aRead More →
The US State Department has announced that it is offering up to $10 million as a reward for information on individuals associated with North Korea‘s notorious state-sponsored hacking groups. TheRead More →
Andrés López, a WhatsApp user whose account was hacked by criminals and more than three million pesos were stolen from his contacts. It is already known that armed robberies areRead More →
Computer technology is the subject of many crimes or plays the role of their accomplice in them. Phishing, identity theft, financial fraud, extorting attacks, and money laundering are just someRead More →
FileWave MDM is a multi-platform mobile device management solution that allows IT administrators to manage, monitor, and view all of the company’s devices. MDM supports a wide range of devices,Read More →
© 2026 All Rights Reserved
info@iicybersecurity.com