Data of 94% of LinkedIn’s 700 million users for sale in dark web forums
A couple of months ago it was revealed that a hacker was selling a database with almost 500 million records extracted from LinkedIn and since then things do not seemRead More →
A couple of months ago it was revealed that a hacker was selling a database with almost 500 million records extracted from LinkedIn and since then things do not seemRead More →
Penetration testing is one of the most important stages of any security analysis, so researchers should always have the best tools in this process. On this occasion, cybersecurity experts fromRead More →
British authorities have issued a warning to Binance, the most important cryptocurrency exchange platform. The Financial Conduct Authority (FCA), United Kingdom financial regulatory body, has decided that the company willRead More →
A recent security report claims that the operators of the Crackonosh malware have gained around 9 thousand units of Monero cryptocurrency, all thanks to its cryptojacking campaign that has alreadyRead More →
French Connection UK (FCUK), a British fashion company of growing popularity, confirmed that its systems were compromised due to an infection of the REvil ransomware. Just a few hours later,Read More →
Cybersecurity specialists reported the discovery of at least 15 flaws in Centreon, an open source solution for monitoring applications, systems and networks based on Nagios concepts. According to the report,Read More →
Specialists from Check Point Research announced the reporting and remediation of multiple vulnerabilities in Atlassian subdomains whose exploitation would have allowed the deployment of cross-site scripting (XSS) and cross-site requestRead More →
The KDE Discover team of researchers has published countless reports on how popular desktop applications handle user-provided URIs, which in certain cases allows the exploitation of some security flaws inRead More →
The U.S. Securities and Exchange Commission (SEC) launched an investigation into SolarWinds’ supply chain cyberattack, though this time focusing on finding evidence that some of the companies involved had concealedRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com