Blog

Threat modelling cybersecurity explained

by iZOOlogicJanuary 30, 2025

Threat modelling cybersecurity allows firms to establish a cyber defence...

Cryptominers use fake CrowdStrike job offers to target devs

by iZOOlogicJanuary 29, 2025

A new phishing campaign that deploys cryptocurrency miners uses fake...

DPRK hackers use RID hijacking to create admin accounts

by iZOOlogicJanuary 29, 2025

The alleged hackers from the Democratic People's Republic of Korea...

Apple iMessage users targeted by a new phishing campaign

by iZOOlogicJanuary 28, 2025

A new phishing operation is targeting Apple iMessage users to...

Phemex crypto exchange hit by a major hack, $85M stolen

by iZOOlogicJanuary 28, 2025

The cryptocurrency exchange Phemex recently fell victim to a major...

UK’s TalkTalk telco probes hacker claims of 18.8M data stolen

by iZOOlogicJanuary 28, 2025

UK telecommunications provider TalkTalk is facing another data security concern...