Blog

APT41 exploits the Google Command and Control (GC2) tool

by iZOOlogicMay 4, 2023

APT41, a China-backed hacking group, was discovered using GC2 or...

Fin7 and ex-Conti members team up for the new Domino backdoor

by iZOOlogicMay 4, 2023

A couple of months ago, researchers observed a new Domino...

T-Mobile confirmed another data breach attack this year

by iZOOlogicMay 4, 2023

Multinational telecommunication company, T-Mobile, disclosed the second data breach incident...

GitHub enhanced its security for verifying packages

by iZOOlogicMay 4, 2023

One of the most prominent open-source software repositories, GitHub, has...

Vice Society ransomware adopted an elusive tactic to steal data

by iZOOlogicMay 4, 2023

The Vice Society ransomware group and its affiliates have been...

RTM Locker, the newest RaaS provider that aids its affiliates

by iZOOlogicMay 3, 2023

The newly emerged ransomware-as-a-service group, RTM Locker, offers a standard...