Blog

Automated attack of cloned repositories compromises GitHub

by iZOOlogicMarch 4, 2024

GitHub faces an automated attack from millions of cloned repositories...

Randstorm flaw endangers millions of cryptocurrency wallets

by iZOOlogicFebruary 28, 2024

The open-source software vulnerability called Randstorm has raised concerns among...

Crypto spam and scams exploit the Google Forms quizzes

by iZOOlogicFebruary 27, 2024

The increase of newly discovered cryptocurrency spam and scams that...

Effluence backdoor persisted despite Atlassian Confluence’s patch

by iZOOlogicFebruary 26, 2024

The Effluence backdoor is a tool that exploits a severe...

GootBot, the latest variant of the GootLoader malware

by iZOOlogicFebruary 26, 2024

The newest iteration of the GootLoader malware, GootBot, has recently...

LockBit ransomware resurfaces despite FBI takedown

by iZOOlogicFebruary 25, 2024

The infamous Russian-speaking ransomware group LockBit has successfully revived its...