Blog

Mustang Panda uses a new infostealer to target government orgs

by iZOOlogicSeptember 11, 2024

The notorious Chinese-speaking cybercriminal organisation Mustang Panda has transitioned to...

RipperSec, an underground alliance of global hacking profiles

by Yuvraj BadgotiSeptember 11, 2024

Key Insights RipperSec is a pro-Palestinian, pro-Muslim hacktivist group operating...

MuddyWater uses RMM tools in advanced infection campaign

by iZOOlogicSeptember 11, 2024

The notorious Iranian-backed cybercriminal organisation MuddyWater is currently using a...

Uncovering a sophisticated phishing attack via WordPress theme exploitation

by Michael AndresSeptember 10, 2024

As cybersecurity experts, we are constantly adapting to the evolving...

Hackers infiltrate Slim CD, exposing 1.7M credit card holders’ data

by iZOOlogicSeptember 10, 2024

Slim CD, a payment processing company, recently disclosed a major...

Hackers use a fake Palo Alto GlobalProtect Tool to breach targets

by iZOOlogicSeptember 10, 2024

Hackers are using a fake Palo Alto GlobalProtect Tool as...