Blog

Hackers used GootLoader and FakeUpdates to target law firms

by iZOOlogicMarch 14, 2023

Threat actors have already targeted about six law firms between...

Chinese hackers used the MQsTTang backdoor to bypass security

by iZOOlogicMarch 14, 2023

One of China’s most notorious threat groups, Mustang Panda, has...

SCARLETEEL operation uses sophisticated tactics to steal data

by iZOOlogicMarch 14, 2023

A newly discovered hacking campaign called SCARLETEEL operation eyes public-facing...

NLBrute malware developer from Russia extradited to the US

by iZOOlogicMarch 14, 2023

The alleged Russian NLBrute malware developer was deported by authorities...

Experts alert banks about the new FiXS ATM malware

by iZOOlogicMarch 14, 2023

Security researchers uncovered a new malware strain called ‘FiXS,’ a...

PlugX trojan pose as a Windows Debugger in a new campaign

by iZOOlogicMarch 13, 2023

PlugX trojan operators have been impersonating the open-source Windows Debugger...