New phishing campaign targets Steam users
Steam is one of the most popular gaming platforms today, and as such its users are frequent victims of complex and dangerous cyberattacks. Such is the case of user DanielRead More →
Steam is one of the most popular gaming platforms today, and as such its users are frequent victims of complex and dangerous cyberattacks. Such is the case of user DanielRead More →
Recent reports claim that some Russian hacking groups are deploying powerful attacks against President Vladimir Putin, mainly disrupting activities such as his phone calls with government officials and other headsRead More →
Cybersecurity experts report the detection of a set of vulnerabilities in Apache Web Server, a modular, high-performance reverse proxy server, generally comparable to Nginx and Squid. According to the report,Read More →
Cybersecurity specialists reported the discovery of at least 15 flaws in Centreon, an open source solution for monitoring applications, systems and networks based on Nagios concepts. According to the report,Read More →
Chipmaker NVIDIA announced the fix of some security flaws that could impact millions of Internet of Things (IoT) devices running Jetson chips. According to the report, exploiting these flaws wouldRead More →
Schneider Electric security teams reported the discovery of a set of critical vulnerabilities in its PowerLogic EGX100 and PowerLogic EGX3000 communication solutions, which are part of the company’s family ofRead More →
Cybersecurity specialists report the discovery of a critical vulnerability in the P2P software development kit of ThroughTek, a company that has developed multiple devices such as IP cameras with P2PRead More →
Apple announced the release of a set of security updates to address two zero-day flaws in previous generation iPhone and iPad devices. The flaws were tracked as CVE-2021-30761 and CVE-2021-30762Read More →
A recent security report points to the detection of a security flaw in the Facebook Messenger Rooms video chat feature would allow threat actors to access photos and videos storedRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com