Top Categories

Spotlight

How headlines can drive change in cyber security

todayDecember 2, 2025

Computer Forensic Expert ThorTech

How headlines can drive change in cyber security

Computer Forensics Company: Computer Forensics Company: Big news stories can shift attitudes. There’s no doubt that insurance vendors and brokers are using major cyber attacks to promote their products, but can security teams also use it to help their businesses be better prepared? By Robert Johnston, N-able Published: 01 Dec [...]

Top Voted
Sorry, there is nothing for the moment.

Blog

485 Results / Page 5 of 49

Background
“Small number of government-ID images” compromised in Discord customer service breach

todayOctober 6, 2025

close

Computer Forensic ThorTech

“Small number of government-ID images” compromised in Discord customer service breach

Digital Forensics: Social platform confirms an “unauthorised party” gained access to user data via a third-party customer service provider Image credit: Discord A third-party customer service provider used by Discord was hacked by an “unauthorised party” resulting in a data breach including “a small number of government-IDs.” Last Friday, Discord ...

Discord customer service system breached by “unauthorised party”, gaining access to “a small number of government-ID images”

todayOctober 6, 2025

close

Computer Forensic joe h

Discord customer service system breached by “unauthorised party”, gaining access to “a small number of government-ID images”

Digital Forensics: “We recommend users stay alert when receiving messages that may seem suspicious.” Image credit: Discord A third-party customer service system used by Discord’s support teams has been hacked, compromising some user personal data, including government IDs. Discord has written to some users confirming that on 20th September, personal ...

US government shutdown stalls cyber intel sharing

todayOctober 2, 2025

close

Computer Forensic Expert ThorTech

US government shutdown stalls cyber intel sharing

Computer Forensics Company: The US Cybersecurity and Information Sharing Act (CISA) of 2015 has expired with no replacement or extension in place amid a chaotic shutdown of the federal government, leaving cyber pros in legal limbo and putting global collaboration on threat intelligence at risk of stalling. The shutdown took ...

BNB Chain’s 3.8M-Follower X Account Hacked: CZ Issues Urgent WalletConnect Phishing Alert

todayOctober 2, 2025

close

Computer Forensic joe h

BNB Chain’s 3.8M-Follower X Account Hacked: CZ Issues Urgent WalletConnect Phishing Alert

Digital Forensics: Key Takeaways: BNB Chain’s official X account, with over 3.8 million followers, was compromised to spread phishing links disguised as airdrops. Binance founder Changpeng Zhao (CZ) issued multiple urgent warnings: “Do NOT connect your wallet.” Binance security teams are coordinating with X to suspend the account, remove phishing ...

Disney Fans Lose Thousands in Fake Solana Coin Scam

todayOctober 2, 2025

close

Computer Forensic ThorTech

Disney Fans Lose Thousands in Fake Solana Coin Scam

Digital Forensics: Digital Forensics: TLDR Disney’s official Instagram accounts were hacked on October 1, 2025, by an unknown entity posting fake cryptocurrency content Hackers promoted a fraudulent coin called “Disney Solana” that did not exist, tricking fans into investing Victims lost hundreds to thousands of dollars within minutes as the ...

Balancing IT security with AI and cloud innovation

todaySeptember 23, 2025

close

Computer Forensic Expert ThorTech

Balancing IT security with AI and cloud innovation

Computer Forensics Company: Computer Forensics Company: Cyber security experts offer insights into how to manage service levels, potential lock-in clauses and security gaps in IT supplier contracts By Cliff Saran, Managing Editor Published: 22 Sep 2025 Organisations increasingly rely on cloud services to drive innovation and operational efficiency, and as ...

Hacked Drones, Spoofed Vendors, and the New Frontline in Jobsite Security

todaySeptember 22, 2025

close

Computer Forensic ThorTech

Hacked Drones, Spoofed Vendors, and the New Frontline in Jobsite Security

Digital Forensics: Construction fraud has entered a new era, with bad actors deploying increasingly sophisticated tactics. Once limited to forged checks or padded invoices, today’s threats play out on a digital battleground—faster, harder to detect, and more disruptive. Hijacked drone feeds, tampered surveillance footage, and spoofed subcontractor invoices are real ...

If You’re Afraid of Getting Hacked, This Avast Tool Does More Than Stop Viruses

todaySeptember 21, 2025

close

Computer Forensic joe h

If You’re Afraid of Getting Hacked, This Avast Tool Does More Than Stop Viruses

Digital Forensics: Please enable cookies. Digital Forensics: Error 1108 Ray ID: 9829d7772f1e42d9 • 2025-09-21 13:17:14 UTC What happened? The owner of this website (kotaku.com) has banned your IP address (2a02:4780:b:1519:0:131c:9d67:1). Was this page helpful? Thank you for your feedback! Cloudflare Ray ID: 9829d7772f1e42d9 • Your IP: 2a02:4780:b:1519:0:131c:9d67:1 • Performance & ...

Are AI agents a blessing or a curse for cyber security?

todaySeptember 19, 2025

close

Computer Forensic Expert ThorTech

Are AI agents a blessing or a curse for cyber security?

Computer Forensics Company: Artificial intelligence (AI) and AI agents are seemingly everywhere. Be it with conference show floors or television adverts featuring celebrities, suppliers are keen to showcase the technology, which they tell us will help make our day-to-day lives much easier. But what exactly is an AI agent? Fundamentally, ...

ThorSolution

Igniting Digital Vigilance

Contact

info@thorsolution.com

310-270-0598

Follow Us



© 2025 ThorSolution. All rights reserved.