Blog

Twitter’s Data Leak Exposes Over 5.4 Million Users
Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users. Twitter denied claims that hackers...

Phishing-as-a-Service on the Rise with Caffeine
Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like "Caffeine." Through an open registration procedure, anyone who...

Vice Society Claims Cincinnati State College Cyberattack
Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on the hackers' websites....

Hackers Execute Arbitrary Code with Microsoft Office
According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device...

Malicious SEO Campaign Affects Thousands of Sites
In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As a result, almost 15,000 sites have been compromised....

Phishing Kit Targets US Shoppers
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and Halloween. The kit...

Lenovo Patches Critical Security Flaws
Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers update their systems...

DuckDuckGo Releases App Tracking Protection Beta for Android
The feature is comparable to Apple's 'App Tracking Transparency. However, unlike Apple, DuckDuckGo's method does not rely on app developers' compliance with user choice. All known trackers are...

How To Develop Accountability In Remote Workers
Accountability can be a tricky thing when it comes to your remote employees. It's something that even seasoned managers struggle with. If that's the boat you find yourself in, take notes! In this...

Bypass Android Lock Screen on Pixel and Other Devices
David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel 6 and Pixel 5 devices, allowing anybody with physical...
Contact Information
- 39301 Badger Street, Suite 500
Palm Desert, CA 9221 - (760) 333-8523
- info@icn.tech