Hackers lock IoT sex toy; an unusual ransomware attack
A group of researchers decided to publicly disclose the source code of the ransomware used to encrypt the Qiui Cellmate, a sex toy enabled with Internet connection. Over the lastRead More →
A group of researchers decided to publicly disclose the source code of the ransomware used to encrypt the Qiui Cellmate, a sex toy enabled with Internet connection. Over the lastRead More →
Cybersecurity experts have developed a new open source tool that makes it easier to use Hashcat. Dubbed CrackQ, this tool provides users with a REST API and a JavaScript graphicalRead More →
New Zealand Reserve Bank executives acknowledged a data breach arising from a cyberattack against a third party hosting company abroad. Also known as Te Petea Matua, this institution is responsibleRead More →
A joint investigation by Advanced Intelligence and HYAS has detected 61 Bitcoin wallets allegedly linked to Ryuk ransomware trading groups, finding that transactions of this cryptocurrency circulate mainly in HuobiRead More →
Microsoft announced the release of a micropatch that fixes a local privilege escalation (LPE) vulnerability in Windows PsExec, the operating system management tool. PsExec functions as a fully interactive TelnetRead More →
This time, mobile security specialists from the International Cyber Security Institute (IICS) will show you how to hack a WiFi router from your smartphone using RouterSploit, a tool for Termux.Read More →
A recent report mentions that the source code of Nissan North America’s mobile apps and some internal tools have been filtered online due to a configuration error on their GitRead More →
A recent statement from the US Department of Justice (DoJ) has confirmed that the attackers behind the SolarWinds supply chain security incident were able to gain access to about 3%Read More →
A group of cybersecurity specialists has detected a campaign for the distribution of a Remote Access Trojan (RAT) disguised as an alleged sexual video of President Donald Trump via emails.Read More →
© 2024 All Rights Reserved
info@iicybersecurity.com