How to hide a malicious word document in a PDF to avoid EDR or AV detection
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of a PDF document. A fileRead More →
A recently launched enterprise driven by financial gain is using a malicious Telegram bot to assist threat actors in defrauding unsuspecting victims. The criminals referred to prospective victims as MammothsRead More →
Both CloudNordic and AzeroCloud, two hosting services based in Denmark, have been hit by ransomware attacks, which have resulted in the loss of the vast majority of client data andRead More →
The Ecuadorian national election, which took place on Sunday, was hampered by problems with internet voting for residents residing outside of the country. The Ecuadorian electoral office blamed these problemsRead More →
An arbitrary code execution vulnerability was found in WinRAR, and it is possible to exploit this issue by opening a RAR file that has been carefully prepared. According to theRead More →
SMS Bomber attacks are becoming more prominent as a contemporary risk that has the potential to have substantial and unsettling repercussions in the field of cybersecurity, which is plagued byRead More →
This week, cleaning product manufacturer Clorox disclosed a cybersecurity issue that resulted in the company having to take a number of its systems down.Monday, the firm disclosed the event inRead More →
A buffer overflow vulnerability was discovered not too long ago in the Wi-Fi driver that Ford employs in the SYNC 3 entertainment system. Following the identification of the vulnerability, FordRead More →
Hackers in Belarus are focusing their attention on foreign embassies in the hopes of stealing papers, recording audio, and tracking victim keystrokes. Researchers from the cybersecurity company ESET gave theRead More →
© 2026 All Rights Reserved
info@iicybersecurity.com