Blog

IT forensics: Protect digital assets

by iZOOlogicJanuary 16, 2025

A proper and well-established IT forensics plan is a necessity...

Understanding Strict-Transport-Security (HSTS)

by iZOOlogicJanuary 16, 2025

What is Strict-Transport-Security? The Strict-Transport-Security (HSTS) HTTP response header is...

Path of Exile 2 admin account used to hijack player accounts

by iZOOlogicJanuary 15, 2025

The developers of the online game Path of Exile 2...

WordPress plugins, WPLMS and VibeBP, suffer from critical bugs

by iZOOlogicJanuary 15, 2025

Several critical vulnerabilities have appeared in a couple of well-known...

Understanding Insecure Cookie Setting: Missing HttpOnly Flag

by iZOOlogicJanuary 15, 2025

Cookies are a critical component of web applications, often used...

Understanding Insecure Cookie Setting: Missing Secure Flag

by iZOOlogicJanuary 14, 2025

Cookies are widely used to store session information, authentication tokens,...