Blog

Hackers exploit Google Calendar to execute a phishing campaign

by iZOOlogicJanuary 3, 2025

Threat actors are taking advantage of Google Calendar invites and...

Understanding and Implementing Referrer Policy

by iZOOlogicJanuary 2, 2025

The Referrer-Policy HTTP header controls how much referrer information the...

US govt attributes the latest telecom hack to Salt Typhoon

by iZOOlogicJanuary 2, 2025

The White House has included another hacking incident in its...

Invoice Ninja suffers from a Server-Side Request Forgery flaw

by iZOOlogicJanuary 2, 2025

Invoice Ninja, a well-known open-source invoicing and project management software,...

Scammers who turned Airbnbs into fraud centres get arrested

by iZOOlogicJanuary 2, 2025

Multiple members of the international cybercriminal organisation that transformed Airbnbs...

HiatusRAT malware found targeting DVRs and web cameras

by iZOOlogicDecember 31, 2024

A new HiatusRAT malware campaign targets and compromises vulnerable web...