OpenSea has been hacked and users email ids leaked
OpenSea, the largest NFT market, suffered an email leak, which affected all users who are subscribed to its newsletter, or who have ever shared their address with the platform. TheRead More →
OpenSea, the largest NFT market, suffered an email leak, which affected all users who are subscribed to its newsletter, or who have ever shared their address with the platform. TheRead More →
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one of the main infection mechanisms used by cybercriminal groups, sinceRead More →
In its most recent edition, Operation First Light 2022, planned by Interpol, led to the identification of various social engineering groups around the world, in addition to the seizure ofRead More →
Many users are unaware that, by default, Kali Linux includes a decryption tool for passwords that protect compressed files, although they would be even more surprised to know that itRead More →
In its latest security alert, Google confirmed the release of updates to address seven vulnerabilities in the Chrome browser, including four bugs considered critical and that could put the millionsRead More →
Cybersecurity specialists report the detection of PACMAN, a new hardware vector attack targeting a function of Apple M1 chips that would allow threat actors to execute arbitrary code on affectedRead More →
Experts from Trellix Threat Labs have shared research on multiple vulnerabilities in an industrial control system (ICS) used to grant physical access to protected facilities, and integrated into building automationRead More →
A worrying number of cybercriminal campaigns occur with no indication of those responsible for these online crimes, especially those with financial motivations. However, in some cases, threat actors leave enoughRead More →
A joint operation by Europol, Eurojust, the U.S. Federal Bureau of Investigation (FBI), Slovakia’s National Crime Agency, and the Slovak Police, led to the arrest of an individual considered oneRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com