Free tool to do automated threat hunting in deep web
As many users will know, browsing the deep web requires tools specific to this task, although needless to say that many work better than others. This time, experts in ethicalRead More →
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.
As many users will know, browsing the deep web requires tools specific to this task, although needless to say that many work better than others. This time, experts in ethicalRead More →
Cybersecurity experts reported the finding of a dangerous security flaw in Homebrew, the open source package manager for macOS and Linux operating systems. According to the report, the flaw wouldRead More →
German researchers claim to have discovered two security flaws that would allow the security of Apple smartphones to be abused through the AirDrop file transfer feature. Both failures reside inRead More →
Any tech company can be the victim of an attempted extortion. According to a security report, REvil ransomware operators threatened Apple to reveal plans for many products that would beRead More →
A report by web security firm Parchstack mentions that the vast majority of the nearly 600 WordPress vulnerabilities reported during 2020 end up negatively impacting plugins and themes developed byRead More →
Since hacking became a practice capable of negatively impacting the critical infrastructure of public and private organizations, developers have sought to create tested deployments of any cyberattack with various results.Read More →
A group of cybersecurity specialists claims to have found evidence that millions of users would have been victims of a massive phishing campaign through Facebook Messenger. This campaign is basedRead More →
Through a statement, Google Project Zero revealed that organizations will now be granted a 30-day period to fix zero-day flaws that are discovered seeking to speed up time for theRead More →
Facebook announced the correction of a coding error in its video services that would allow threat actors to remove content without users being able to intervene. Ahmad Talahmeh, a cybersecurityRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com