Blog

Ransomware strains that targeted the CIS for 2021

by iZOOlogicOctober 25, 2021

This year has been challenging for businesses, especially with the pandemic...

Threat actors might exploit vulnerable Dahua Cameras from afar

by iZOOlogicOctober 25, 2021

Recently, research revealed that two authentication bypass vulnerabilities were present...

Journalists and whistleblower sharing platform Onionshare, revealed bugs through the latest patch

by iZOOlogicOctober 23, 2021

OnionShare a file-sharing system used by journalists and whistleblowers to confidentially...

Large companies lag in domain security enhancement adoption in preventing cyberattacks

by iZOOlogicOctober 21, 2021

Many studies state that web domains of large companies remain to be...

Ethernet cables are being used in a newfound data exfiltration mechanism against air-gapped systems

by iZOOlogicOctober 21, 2021

The latest research has found a new data exfiltration mechanism that utilizes Ethernet cables as...

Two-step verification now required to millions of Google users for additional user account security

by iZOOlogicOctober 20, 2021

A publication was released by Google recently regarding the company’s plans of...