Blog

APT36 uses YouTube app clones to target Android users

by iZOOlogicDecember 21, 2023

The APT36 state-sponsored hacking group (aka Transparent Tribe) uses YouTube...

Phishing and Vishing: Exposing the threats of cybersecurity

by iZOOlogicDecember 20, 2023

As technology evolves and people’s lives become more connected with...

Rug Pull scheme, the latest threat to the crypto community

by iZOOlogicDecember 8, 2023

The Rug Pull scheme is a malicious operation that targets...

What phishing is: Unmasking today’s predominant cyber threat

by iZOOlogicDecember 7, 2023

In recent years, the cybercriminal act known as phishing has...

Understanding how trojan horse works in cyberattacks

by iZOOlogicDecember 6, 2023

Modern-day trojan horses operate by infiltrating and causing damage from...

Fawry e-payment service provider faces a LockBit attack

by iZOOlogicDecember 6, 2023

The Egypt-based Fawry e-payment service provider has allegedly suffered a...