IT Security Central
IT Security Central
How to hack an Android smartphone with Evil Droid
The use of hidden malware in mobile applications outside official platforms such as the Play Store or AppStore is one...
Two critical vulnerabilities in Cisco email, web and chat applications allow threat actors to steal confidential data
Cisco products customers have been alerted with critical high-severity flaw in its email and web security appliances Affected Product: Cisco...
Citrix Application Delivery Management (ADM) critical vulnerabilities allow taking control of the servers via password reset
Citrix Application Delivery Management (ADM) is an intuitive, comprehensive platform that enables automation, orchestration, management, and analytics for application...
How were thousands of liters of petrol/diesel was stolen from different gas stations?
Virginia Beach police are investigating an incident in which cyber criminals reportedly hacked into a gas station pump and stole...
Demonic Vulnerability (CVE-2022-32969). Browser extension cryptocurrency wallets like Metamask, Phantom, and Brave affected by vulnerability. Allows stealing funds from wallets
The Demonic Vulnerability (CVE-2022-32969) was revealed by the Halborn team. The vulnerability exists in MetaMask, Phantom, Brave, xDefi, and others...
Cyber bullying is now a crime in Japan. Culprits can get up to a year of prison time
Japan’s government passed a law making cyber bullying punishable by imprisonment amid rising public concern over cyberbullying. Under the amendment...
Operation First Light 2022: Interpol arrests 2,000 scammers conducting social engineering campaigns in more than 1,700 locations worldwide
In its most recent edition, Operation First Light 2022, planned by Interpol, led to the identification of various social engineering...