Blog

A new Proxyjacking campaign still abuses the Log4j vulnerability

by iZOOlogicApril 19, 2023

A new cybercriminal campaign called Proxyjacking has exploited last year's...

The new STYX dark web market offers extensive fraud services

by iZOOlogicApril 19, 2023

Since its initial emergence on January 19, the new dark...

Money Message, a new and aggressive cybercriminal operation

by iZOOlogicApril 18, 2023

The new cybercriminal threat group, Money Message, is an overly...

TikTok faces a fine for an alleged children’s data misuse

by iZOOlogicApril 17, 2023

The United Kingdom-based data watchdog fined TikTok nearly 13 million...

RedGolf uses a KEYPLUG backdoor to target Windows and Linux

by iZOOlogicApril 17, 2023

The China-backed threat operation from RedGolf Group has executed a...

Threat actors use the NullMixer to deploy polymorphic loaders

by iZOOlogicApril 17, 2023

Researchers discovered a new malicious operation that uses the NullMixer...