Romantic scams generate losses of over $300 million USD
A recent report by the US Federal Trade Commission (FTC) notes that one of the most successful cybercriminal practices is known as the “romantic scam,” which in 2020 accounted forRead More →
A recent report by the US Federal Trade Commission (FTC) notes that one of the most successful cybercriminal practices is known as the “romantic scam,” which in 2020 accounted forRead More →
Yandex, a Russian technology company, has revealed that one of its system administrators allowed unauthorized access to thousands of mailboxes. The company detected this anomalous behavior during a routine securityRead More →
A report by the Financial Services Information Analysis and Exchange Center (FS-ISAC), a global cybersecurity intelligence exchange community for financial technology companies (fintech), mentions that during 2020 the networks ofRead More →
The Cisco Talos research team has detected the return of a variant of Remote Access Trojan (RAT) that in the past affected various windows system deployments, although this time theyRead More →
A cybersecurity expert published a report that chronicles, in broad detail, how he managed to hack the systems of renowned technology companies such as Apple, Microsoft or PayPal using aRead More →
According to recent World Bank figures, there are currently around 3 billion active credit cards worldwide, so cybercriminal groups dedicated to cardholder fraud campaigns have a larger attack surface thanRead More →
Security specialists reported the finding of a critical vulnerability in a Docker Engine feature; if exploited, this flaw would allow threat actors to scale privileges to root users. Alex Chapman,Read More →
Cybersecurity specialists report that Iranian government has deployed two major Internet surveillance and monitoring operations to track the activities of at least a thousand dissidents and political activists. The allegedRead More →
Cybersecurity specialists mention that a malicious hacking group discovered that it is possible to abuse Google Chrome sync feature in order to send infected commands to firewalls and other networkRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com