Top Categories

Spotlight

Islamic terrorists kill 64 Catholics in attack on parish in eastern Congo

todaySeptember 26, 2025

Computer Forensic ThorTech

Islamic terrorists kill 64 Catholics in attack on parish in eastern Congo

Digital Forensics: Witnesses reported that many victims were hacked with machetes while others were shot or bludgeoned. At least 64 people were killed late at night when Islamic terrorists stormed a Catholic parish in North Kivu province, Democratic Republic of the Congo. Local officials said the attackers struck during a [...]

Top Voted
Sorry, there is nothing for the moment.

krigo

145 Results / Page 10 of 17

Background
How Cryptocurrency Is Changing Cyber Security

todayNovember 26, 2024

close

Computer Forensic Expert joe h

How Cryptocurrency Is Changing Cyber Security

Computer Forensics Company: One of the most prominent features of cryptocurrency is its underlying technology—the blockchain. The blockchain serves as the backbone that powers all cryptocurrencies, allowing for these digital assets to connect to other networks and computers seamlessly. While there are undeniable security advantages of cryptocurrency, such as its ...

DOJ: Man hacked networks to pitch cybersecurity services

todayNovember 26, 2024

close

Computer Forensic joe h

DOJ: Man hacked networks to pitch cybersecurity services

Digital Forensics: A Kansas City man has been indicted for allegedly hacking into computer networks and using this access to promote his cybersecurity services. According to the Department of Justice, Nicholas Michael Kloster, 31, of Kansas City, Missouri, breached two computer networks, a health club business and a nonprofit organization. According ...

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

todayNovember 22, 2024

close

Computer Forensic joe h

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

Digital Forensics: Hackers have already compromised thousands of Palo Alto Networks firewalls in attacks exploiting two recently patched zero-day vulnerabilities. The two security flaws are an authentication bypass (CVE-2024-0012) in the PAN-OS management web interface that remote attackers can exploit to gain administrator privileges and a PAN-OS privilege escalation (CVE-2024-9474) ...

T-Mobile confirms it was hacked in recent wave of telecom breaches

todayNovember 17, 2024

close

Computer Forensic joe h

T-Mobile confirms it was hacked in recent wave of telecom breaches

Digital Forensics: T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been ...

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

todayNovember 5, 2024

close

Computer Forensic Expert joe h

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

Computer Forensics Company: UK’s National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named “Pigmy Goat” created to backdoor Sophos XG firewall devices as part of recently disclosed attacks by Chinese threat actors. Last week, Sophos published a series of reports dubbed “Pacific Rim” that detailed five-year ...

ThorSolution

Igniting Digital Vigilance

Contact

info@thorsolution.com

310-270-0598

Follow Us



© 2025 ThorSolution. All rights reserved.