Blog

Third-party trackers discovered logging user data from site forms

by iZOOlogicMay 20, 2022

About 100,000 top-ranking websites have recently been examined by security...

Phishing actors continued leveraging HTML files in their campaigns

by iZOOlogicMay 20, 2022

New studies revealed that HTML files are still at the...

PHP Code utilised by threat actors to steal credit card data

by iZOOlogicMay 20, 2022

The FBI published an advisory regarding an individual scraping credit...

iOS ‘Find My’ allows hackers to run malware on switched off devices

by iZOOlogicMay 19, 2022

Apple’s ‘Find My’ feature was found with a critical flaw...

CERT-IN to collect user data aiming to solve incident analysis issues

by iZOOlogicMay 19, 2022

India has recently mandated all internet service providers to gather...

Jester Stealer spread via phishing campaigns, CERT-UA warns

by iZOOlogicMay 19, 2022

Threat actors had been observed spreading another emerging malware dubbed...