Blog

197 Results / Page 1 of 20

Background
T-Mobile confirms it was hacked in recent wave of telecom breaches

todayNovember 17, 2024

close

Computer Forensic joe h

T-Mobile confirms it was hacked in recent wave of telecom breaches

Digital Forensics: T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been ...

Remembering When Satoshi Nakamoto’s Emails Were Hacked

todayNovember 9, 2024

close

Computer Forensic ThorTech

Remembering When Satoshi Nakamoto’s Emails Were Hacked

Digital Forensics: By Mark Hunter 1 day agoFri Nov 08 2024 08:30:42 Reading Time: 2 minutes Satoshi Nakamoto’s email account was hacked ten years ago, which threatened to expose his identity The hack led to unauthorized messages being sent under Nakamoto’s name, sparking fears and confusion about Bitcoin’s security Questions ...

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

todayNovember 5, 2024

close

Computer Forensic Expert joe h

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

Computer Forensics Company: UK’s National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named “Pigmy Goat” created to backdoor Sophos XG firewall devices as part of recently disclosed attacks by Chinese threat actors. Last week, Sophos published a series of reports dubbed “Pacific Rim” that detailed five-year ...

Hacked TP-Link routers at center of massive botnet used to attack Azure customers

todayNovember 4, 2024

close

Computer Forensic Sewa

Hacked TP-Link routers at center of massive botnet used to attack Azure customers

Digital Forensics: Serving tech enthusiasts for over 25 years. TechSpot means tech analysis and advice you can trust. In context: CovertNetwork-1658 is a stark reminder of the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. Using compromised devices as part of a botnet also underscores the importance of securing IoT devices ...

 


LOGO

 

  • info@thorsolution.com


Products


Company


Contacts

Support