Blog

State-backed gangs used a custom loader to perform espionage attacks

by iZOOlogicJune 28, 2022

A new custom DLL loader, dubbed HUI Loader, was used...

LinkedIn platform used by cryptocurrency scammers to terrorise users

by iZOOlogicJune 28, 2022

The FBI released a threat advisory regarding an ongoing cryptocurrency...

Two Russian threat groups utilised the Follina flaw to target Ukraine

by iZOOlogicJune 28, 2022

The Ukrainian national cybersecurity team has released a threat advisory...

Microsoft’s Azure Front Door cloud CDN used to create phishing sites

by iZOOlogicJune 28, 2022

Cybercriminals used Microsoft’s Azure Front Door (AFD) to host phishing...

Fake Facebook emails used by hackers to target EI-ISAC members

by iZOOlogicJune 27, 2022

An ongoing phishing campaign from an unidentified group of threat...

HTML attachments used by VIP3R spear-phishing group to bypass security

by iZOOlogicJune 27, 2022

Cybersecurity researchers have discovered a spear-phishing campaign used by the...