How to hack anyone using just a QR code?
QR code (Quick Response) is the name by which we all know the modules to store information in a dot matrix or in a two-dimensional barcode. This matrix is readRead More →
QR code (Quick Response) is the name by which we all know the modules to store information in a dot matrix or in a two-dimensional barcode. This matrix is readRead More →
Citrix announced the release of security patches for multiple vulnerabilities present in some of its products, including a severe issue in SD-WAN. Tracked as CVE-2022-27505, this flaw was described asRead More →
The prestigious Italian fashion house Ermenegildo Zegna has confirmed that it was the victim of a ransomware attack that severely affected its operations and could be fixed without paying aRead More →
In its latest update, the Open Web Application Security Project (OWASP) announced the inclusion of three new categories to its list of top security risks that could put all kindsRead More →
Those responsible for the NGINX web server released a series of security updates to fix a severe zero-day vulnerability in its Lightweight Directory Access Protocol (LDAP). The NGINX LDAP referenceRead More →
Play Store security teams confirmed that SharkBot, a dangerous banking malware distributed through fake antivirus tools, has finally been removed from Google official repository. SharkBot was first spotted on theRead More →
A few months ago, specialists from the security firm ThreatFabric reported the detection of a new malware variant for Android devices. Identified as Coper, this malware family appeared to beRead More →
After multiple rumors, researchers from security firm Trend Micro confirmed that the Spring4Shell vulnerability is being exploited by Mirai botnet hackers. As previously reported, CVE-2022-22965 and CVE-2022-22963 are critical vulnerabilitiesRead More →
Developers addressed a command injection vulnerability in asciidoctor-include-ext, a popular Ruby library that allows users to parse and convert AsciiDoc files. According to the report, this vulnerability allows remote codeRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com