Blog

LummaC2 reemerged, now hides itself using PowerShell tactics

by iZOOlogicSeptember 3, 2024

The notorious information-stealing virus dubbed LummaC2 has reemerged in the...

Midnight Blizzard exploits iOS and Android via watering hole tactics

by iZOOlogicSeptember 2, 2024

The Russian-backed advanced persistent threat group Midnight Blizzard has been...

American Radio Relay League admits paying a ransom demand

by iZOOlogicSeptember 2, 2024

The American Radio Relay League (ARRL) confirmed that it paid...

Phishing campaign delivers Android banking malware for fraudulent transactions

by Yuvraj BadgotiSeptember 1, 2024

During a routine investigation, Red Team observed a phishing campaign...

Latest Gafgyt botnet strain used for cryptomining attacks

by iZOOlogicAugust 30, 2024

A newly discovered Gafgyt botnet variant currently targets computers with...

WordPress sites are prone to attacks due to a LiteSpeed plugin bug

by iZOOlogicAugust 29, 2024

The newly discovered LiteSpeed plugin bug has endangered millions of...