HIJACK TARGET WINDOWS MACHINE WITH MALICIOUS DLL
You have heard the famous technique used by Chinese threat actors to hijack system is that they hijack DLL or Dynamic Link Libraries to hack in to someone’s computer. ButRead More →
You have heard the famous technique used by Chinese threat actors to hijack system is that they hijack DLL or Dynamic Link Libraries to hack in to someone’s computer. ButRead More →
Phishing Defense Center (PDC) specialists have just revealed the detection of a phishing campaign in which threat actors pretend to be Skype employees. As mentioned above, the social distancing policyRead More →
The most widely used but yet the most vulnerable video conferencing app ZOOM has now come up with a new variant of attack that can escalate the attendee’s permission inRead More →
A recently released report by security researcher Adam Chester details a new method for attacking Azure cloud deployments; So far there is no known method to fix this vulnerability, soRead More →
Cybersecurity incidents are so common that sometimes companies face more than one inconvenience at a time. Just a couple of days after revealing a malware infection, the cybersecurity company CognizantRead More →
Just days after Microsoft released its update package for the month of April the company issued a new set of security patches to fix various vulnerabilities in the Office suiteRead More →
Cybersecurity specialists have revealed the presence of a potential security vulnerability in three backup and security software applications for Toshiba Canvio external hard drive product. For security, Toshiba advises administratorsRead More →
Few illicit activities have shown as much evolution and growth as cybercrime. According to information published by Atlas VPN, malicious hackers around the world have made more than 22 millionRead More →
A recently published investigation revealed the presence of a dangerous vulnerability that would allow a hacker to completely control a Windows system. Previously, Microsoft had revealed some details related toRead More →
© 2024 All Rights Reserved
info@iicybersecurity.com