Blog

New Malware variant targeting routers and IoT Devices using 13 different exploits

by iZOOlogicFebruary 12, 2020

Cyber-security researchers has just released the discovery of a new...

Office 365 Phishing Technique – A Legacy Threat

by iZOOlogicFebruary 11, 2020

Cyber criminals are at it again. And this time, they...

Tech firm is tracking its users incognito

by iZOOlogicFebruary 7, 2020

Just when you thought you have disabled location tracking since...

First American Financial suffers data leak

by iZOOlogicFebruary 4, 2020

First American Financial Corporation left as many as 885 million...

CryptoBot derived from famous malwares attacking asian countries

by iZOOlogicFebruary 1, 2020

We detected a cryptobot malware that uses multiple propagation and...

Hackers exploit Atlassian confluence servers to spread malware

by iZOOlogicJanuary 28, 2020

A group of attackers are actively exploiting a critical vulnerability...