Blog

A malicious PyPI package hides code through steganography

by iZOOlogicNovember 15, 2022

Security researchers have recently found a new malicious package inside...

Malicious VPN application vector of the SandStrike spyware

by iZOOlogicNovember 15, 2022

The newly discovered SandStrike spyware uses a compromised VPN app...

A spotted Google SEO poisoning campaign hacked over 15K sites

by iZOOlogicNovember 15, 2022

Threat actors have launched a wide-scale search engine optimisation (SEO)...

Compromised GitHub repositories led to a Dropbox breach

by iZOOlogicNovember 15, 2022

Dropbox revealed experiencing a security breach due to an attack...

A global conference is set up to address cybercrime threats

by iZOOlogicNovember 15, 2022

Following the White House’s announcement to host officials from 37...

Threat actors used the Laplas Clipper to target crypto users

by iZOOlogicNovember 14, 2022

Threat actors have included in their sophisticated attacks the Laplas...