Month: August 2025

23 Results / Page 1 of 3

Background
Fayetteville man needs a kidney transplant 

todayAugust 31, 2025

close

Computer Forensic Expert Sewa

Fayetteville man needs a kidney transplant 

Computer Forensics Company: As a cyber security engineer, Adewale Osiyale could work remotely from nearly anywhere. But after growing up in Nigeria and living in a few other metro Atlanta suburbs, he fell in love with Fayetteville three years ago. “It’s the serenity. It’s a place you would love to ...

UK cyber security centre helps expose China-based cyber campaign

todayAugust 31, 2025

close

Computer Forensic Expert ThorTech

UK cyber security centre helps expose China-based cyber campaign

Computer Forensics Company: pinkeyes – stock.adobe.com Computer Forensics Company: GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses By Karl Flinders, Chief reporter and senior editor EMEA Published: 28 Aug 2025 10:30 Chinese technology companies have been linked to targeting governments ...

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

todayAugust 28, 2025

close

Computer Forensic Expert ThorTech

Global Salt Typhoon hacking campaigns linked to Chinese tech firms

Computer Forensics Company: The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms. According to the joint advisories[[NSA, NCSC], Sichuan Juxinhe Network Technology Co. Ltd., Beijing Huanyu ...

FreePBX servers hacked via zero-day, emergency fix released

todayAugust 28, 2025

close

Computer Forensic ThorTech

FreePBX servers hacked via zero-day, emergency fix released

Digital Forensics: The Sangoma FreePBX Security Team is warning about an actively exploited FreePBX zero-day vulnerability that impacts systems with the Administrator Control Panel (ACP) is exposed to the internet. FreePBX is an open-source PBX (Private Branch Exchange) platform built on top of Asterisk, widely used by businesses, call centers, ...

Plug In, Get Hacked: A USB Cryptomining Attack Exposed 

todayAugust 21, 2025

close

Computer Forensic Sewa

Plug In, Get Hacked: A USB Cryptomining Attack Exposed 

Digital Forensics: Key takeaways:  A multi-stage USB cryptomining attack uses DLL hijacking and PowerShell to install hidden miners on your computer.  The most targeted industries include financial, healthcare, education, and telecom sectors. EDR tools, strict USB usage policies, and regular employee awareness training are effective in mitigating such USB-based attacks.  ...

ThorSolution

Igniting Digital Vigilance

Contact

info@thorsolution.com

310-270-0598

Follow Us



© 2025 ThorSolution. All rights reserved.