Top Categories

Spotlight

US government shutdown stalls cyber intel sharing

todayOctober 2, 2025

Computer Forensic Expert ThorTech

US government shutdown stalls cyber intel sharing

Computer Forensics Company: The US Cybersecurity and Information Sharing Act (CISA) of 2015 has expired with no replacement or extension in place amid a chaotic shutdown of the federal government, leaving cyber pros in legal limbo and putting global collaboration on threat intelligence at risk of stalling. The shutdown took [...]

Top Voted
Sorry, there is nothing for the moment.

Blog

443 Results / Page 25 of 45

Background
How Cryptocurrency Is Changing Cyber Security

todayNovember 26, 2024

close

Computer Forensic Expert joe h

How Cryptocurrency Is Changing Cyber Security

Computer Forensics Company: One of the most prominent features of cryptocurrency is its underlying technology—the blockchain. The blockchain serves as the backbone that powers all cryptocurrencies, allowing for these digital assets to connect to other networks and computers seamlessly. While there are undeniable security advantages of cryptocurrency, such as its ...

DOJ: Man hacked networks to pitch cybersecurity services

todayNovember 26, 2024

close

Computer Forensic joe h

DOJ: Man hacked networks to pitch cybersecurity services

Digital Forensics: A Kansas City man has been indicted for allegedly hacking into computer networks and using this access to promote his cybersecurity services. According to the Department of Justice, Nicholas Michael Kloster, 31, of Kansas City, Missouri, breached two computer networks, a health club business and a nonprofit organization. According ...

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

todayNovember 22, 2024

close

Computer Forensic joe h

Over 2,000 Palo Alto firewalls hacked using recently patched bugs

Digital Forensics: Hackers have already compromised thousands of Palo Alto Networks firewalls in attacks exploiting two recently patched zero-day vulnerabilities. The two security flaws are an authentication bypass (CVE-2024-0012) in the PAN-OS management web interface that remote attackers can exploit to gain administrator privileges and a PAN-OS privilege escalation (CVE-2024-9474) ...

T-Mobile confirms it was hacked in recent wave of telecom breaches

todayNovember 17, 2024

close

Computer Forensic joe h

T-Mobile confirms it was hacked in recent wave of telecom breaches

Digital Forensics: T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been ...

ThorSolution

Igniting Digital Vigilance

Contact

info@thorsolution.com

310-270-0598

Follow Us



© 2025 ThorSolution. All rights reserved.