Blog

Hackers hijack an Ultralytics AI model for a supply chain attack

by iZOOlogicDecember 31, 2024

Threat actors have started to exploit the Ultralytics YOLO11 AI...

PUMAKIT, a new Linux Rootkit that could bypass security detection

by iZOOlogicDecember 27, 2024

A newly discovered Linux rootkit, PUMAKIT, has various capabilities that...

Hackers infiltrated the Report Support SaaS of BeyondTrust

by iZOOlogicDecember 27, 2024

The privileged access management provider, BeyondTrust, became the subject of...

DFIR: Digital forensics and incident response

by iZOOlogicDecember 27, 2024

Having a strong DFIR (Digital Forensics and Incident Response) plan...

XorBot botnet reemerged with upgraded capabilities

by iZOOlogicDecember 27, 2024

Last year’s XorBot botnet has reappeared recently in the cybercriminal...

Remote access exploited in latest DarkGate malware campaign

by iZOOlogicDecember 24, 2024

A new cyberattack campaign has surfaced, leveraging social engineering techniques...