Blog

Whitepaper: Deep Learning & AI — Malicious links of APK introduction

by iZOOlogic Data Science/AI EngineersMarch 12, 2025

This whitepaper examines the critical role of advanced machine learning...

Whitepaper: AI-based simulation of phishing URLs and content

by iZOOlogic Data Science/AI EngineersMarch 12, 2025

This whitepaper explores the growing threat of phishing and brand...

FinalDraft malware uses Outlook as a C2 server to avoid detection

by iZOOlogicMarch 12, 2025

The newly discovered malware strain, FinalDraft, has allegedly utilised the...

Understanding Insecure Cookie Setting: Domain Too Loose

by iZOOlogicMarch 11, 2025

Cookies are an integral part of web applications, often used...

Understanding CRLF Injection

by iZOOlogicMarch 11, 2025

CRLF (Carriage Return Line Feed) injection is a web security...

Understanding the HTTP TRACE Method

by iZOOlogicMarch 11, 2025

What is the HTTP TRACE Method? The HTTP TRACE method...