How to hide a file in any image in a very simple way
Regardless of our motivations, we’ve all looked for a way to hide a file. Although there are multiple tools that can help us achieve this goal, it may not beRead More →
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.
Regardless of our motivations, we’ve all looked for a way to hide a file. Although there are multiple tools that can help us achieve this goal, it may not beRead More →
Although Cisco recognized the detection of 68 vulnerabilities in various router models, the company announced that these flaws will not be corrected since vulnerable devices have reached the end ofRead More →
Last week, the Federal Bureau of Investigation (FBI) detailed the detection of an information-gathering operation affecting multiple U.S. government agencies, in a campaign attributed to threat actors sponsored by theRead More →
In its most recent report, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that a group of threat actors has managed to bypass the multi-factor authentication mechanisms of some cloudRead More →
In a security alert, the European Medicines Agency (EMA) revealed that some details about the coronavirus vaccine developed by Pfizer/BioNTech were exposed online. EMA is a decentralized agency responsible forRead More →
The most recent days have been very busy for Parler, a right-wing social media platform, as after a brief rise in popularity the most important technology companies refused to continueRead More →
Facebook has announced the fix of a vulnerability that would have allowed threat actors to post to any page without admin control: “An attacker could share a post in anyRead More →
A group of researchers decided to publicly disclose the source code of the ransomware used to encrypt the Qiui Cellmate, a sex toy enabled with Internet connection. Over the lastRead More →
Cybersecurity experts have developed a new open source tool that makes it easier to use Hashcat. Dubbed CrackQ, this tool provides users with a REST API and a JavaScript graphicalRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com