Personal Data of 550,000 guns owners leaked
A website that lets users purchase and trade firearms was hacked, and as a result, the names of the website’s members were made public. The security breach revealed vast amountsRead More →
A website that lets users purchase and trade firearms was hacked, and as a result, the names of the website’s members were made public. The security breach revealed vast amountsRead More →
Swindlers behind the latest malicious effort are duping victims by creating deepfaked versions of photographs and videos purporting to show the tycoon. In the past, several publications shown numerous deepfakeRead More →
The global leader in satellite broadcasting, DISH, reported on Tuesday to the Securities and Exchange Commission (SEC) that a ransomware attack was the source of “system issues” that occurred overRead More →
New evidence reveals that over the year 2022, three distinct cybercriminal organizations gained access to the internal networks of the massive communications company T-Mobile in more than one hundred individualRead More →
On February 27, 2023, a Twitter user named MCbcMC2005 (Twitter/MCbcMC2005) tweeted that the Two-Factor Authentication exploits in Grand Theft Auto Online had come back. The owner of the GTA OnlineRead More →
The infrastructure for a hacking effort that exploited Microsoft OneNote files to distribute malware was shared with a previous campaign that employed a data stealer that was housed on aRead More →
AMD has disclosed that there is a high-severity vulnerability in the Ryzen Master software, which may potentially enable an adversary to gain complete control of the affected machine. Access toRead More →
This week, SolarWinds released three warnings that detailed high-severity vulnerabilities that are anticipated to be corrected with an upgrade to the SolarWinds Platform before the month of February is out.Read More →
Argo CD is a well-known open-source GitOps continuous delivery solution for Kubernetes. It is used to monitor operating applications and compares their real state, which assists administrators in synchronizing runningRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com