Blog

Website vulnerability scanner insights

by iZOOlogicMarch 7, 2025

A website vulnerability scanner is one of the most effective...

Phishing campaign uses fake Facebook copyright alerts

by iZOOlogicMarch 6, 2025

Scammers use fake Facebook copyright alerts to execute a new...

Rubrik rotates its authentication keys after a potential leak

by iZOOlogicMarch 6, 2025

Rubrik disclosed that an unwanted incident had compromised one of...

A large-scale brute force attack targets various VPN devices

by iZOOlogicMarch 5, 2025

A newly discovered massive brute force attack that employs about...

EncryptHub deploys infostealers to hundreds of organisations

by iZOOlogicMarch 5, 2025

EncryptHub, a notorious threat group, has been targeting various organisations...

Kimsuky’s new campaign uses RDP Wrapper for remote access

by iZOOlogicMarch 4, 2025

The notorious North Korean-backed cybercriminal organisation Kimsuky uses a custom-built...