International Institute of Cyber Security (IICS)

One of the main skills that a hacker must have is to know how to hide their trail to prevent investigators or cybersecurity and digital forensics experts from detecting theirRead More →

Most users of computers, smartphones, and other technology deployments ignore many functions of these devices and the proper methods to protect the information they contain, demonstrating the lack of efficientRead More →

Cybersecurity specialists report the detection of three vulnerabilities in cPanel, the control panel for the management of web hosting servers that provide automation tools and a graphical interface based onRead More →

Cybersecurity specialists report the discovery of at least 10 vulnerabilities in Industrial Automation DOPSoft, a solution for the automation of industrial environments developed by Delta Electronics. According to the report,Read More →

A recent report from the Cybersecurity and Infrastructure Security Agency (CISA) points to the detection of multiple errors that allow the deployment of denial of service (DoS) attacks, theft ofRead More →