Marcus Thorne

Senior Cybersecurity Analyst and Digital Privacy Advocate with over 15 years of experience in network security. Marcus specializes in threat intelligence and data protection strategies.

Preview image for: Malicious AI Chrome Extensions: A Deep Dive into Credential Harvesting and Email Espionage

Malicious AI Chrome Extensions: A Deep Dive into Credential Harvesting and Email Espionage

Analysis of fake AI Chrome extensions (ChatGPT, Gemini, Grok) stealing passwords and spying on emails, affecting hundreds of thousands of users.
Preview image for: Ivanti EPMM Zero-Days: A Recurring Nightmare Demanding a Strategic Security Overhaul

Ivanti EPMM Zero-Days: A Recurring Nightmare Demanding a Strategic Security Overhaul

Ivanti EPMM zero-days continue to plague enterprises, spotlighting the critical need to abandon "patch and pray" for proactive security.
Preview image for: Google Uncovers State-Backed Hackers Weaponizing Gemini AI for Advanced Reconnaissance and Attack Support

Google Uncovers State-Backed Hackers Weaponizing Gemini AI for Advanced Reconnaissance and Attack Support

Google reports North Korea's UNC2970 using Gemini AI for target recon, accelerating cyberattacks and information operations.
Preview image for: Claude's Free Tier Gains Pro Power: Is the $20 Subscription Now Obsolete for Cybersecurity & OSINT Pros?

Claude's Free Tier Gains Pro Power: Is the $20 Subscription Now Obsolete for Cybersecurity & OSINT Pros?

Anthropic's free Claude now boasts Pro features. We analyze if the $20 subscription remains essential for advanced cybersecurity and OSINT tasks.
Preview image for: CVE-2026-20841: Notepad's Markdown Feature Opens Door to RCE via Command Injection

CVE-2026-20841: Notepad's Markdown Feature Opens Door to RCE via Command Injection

Critical RCE vulnerability (CVE-2026-20841) in Windows Notepad's Markdown feature allows command injection, demanding immediate patching.
Preview image for: Rogue Outlook Add-in

Rogue Outlook Add-in "AgreeTo" Transforms into Potent Phishing Kit, Exfiltrating 4,000 Credentials and Payment Data

Abandoned Outlook add-in "AgreeTo" became a sophisticated phishing kit, stealing 4,000 credentials and payment data.
Preview image for: Judicial Gridlock: How ICE Petitions are Overloading Minnesota's Court System & Threatening Due Process

Judicial Gridlock: How ICE Petitions are Overloading Minnesota's Court System & Threatening Due Process

Unprecedented ICE petitions are causing systemic overload in Minnesota courts, demanding advanced technical solutions and resilience strategies.
Preview image for: ISC Stormcast 2026: Dissecting Advanced Multi-Stage Cyber Campaigns and Next-Gen Forensics

ISC Stormcast 2026: Dissecting Advanced Multi-Stage Cyber Campaigns and Next-Gen Forensics

Analysis of 2026's sophisticated multi-stage cyberattacks, zero-day exploits, AI-driven threats, and advanced forensic techniques.
Preview image for: North Korean Hackers Elevate Cyber Threats with Deepfake Video Calls Targeting Crypto Firms

North Korean Hackers Elevate Cyber Threats with Deepfake Video Calls Targeting Crypto Firms

North Korean hackers use deepfake video calls, stolen Telegram accounts, and ClickFix attacks to deploy infostealer malware on crypto firms.
Preview image for: Kimwolf Botnet Swamps Anonymity Network I2P: A Deep Dive into Distributed Resilience Exploitation

Kimwolf Botnet Swamps Anonymity Network I2P: A Deep Dive into Distributed Resilience Exploitation

Kimwolf botnet disrupts I2P, leveraging its anonymity for C2 resilience, causing significant network degradation for users.
Preview image for: APT36 and SideCopy Unleash Cross-Platform RAT Campaigns Against Indian Entities

APT36 and SideCopy Unleash Cross-Platform RAT Campaigns Against Indian Entities

APT36 and SideCopy target Indian defense/government with Geta, Ares, DeskRATs for Windows/Linux data exfiltration.
Preview image for: GitGuardian Secures $50M Series C: Confronting the Non-Human Identities Crisis and AI Agent Security Gap

GitGuardian Secures $50M Series C: Confronting the Non-Human Identities Crisis and AI Agent Security Gap

GitGuardian raises $50M Series C to address critical security challenges posed by non-human identities and AI agent vulnerabilities.
Preview image for: Best VPN Services 2026: Expert Tested for Advanced Threat Mitigation & Digital Sovereignty

Best VPN Services 2026: Expert Tested for Advanced Threat Mitigation & Digital Sovereignty

Expert-tested VPNs for 2026: unrivaled speed, security, and privacy against evolving cyber threats and advanced reconnaissance.
Preview image for: YubiKey 5.8: Pioneering Passkey-Enabled Digital Signatures for Unprecedented Security

YubiKey 5.8: Pioneering Passkey-Enabled Digital Signatures for Unprecedented Security

YubiKey 5.8 firmware integrates hardware-backed signatures with passkeys, leveraging FIDO CTAP 2.3 and WebAuthn for robust digital trust.
Preview image for: Microsoft Patch Tuesday: Six Actively Exploited Zero-Days Signal Escalating Threat Landscape

Microsoft Patch Tuesday: Six Actively Exploited Zero-Days Signal Escalating Threat Landscape

Microsoft's latest Patch Tuesday reveals six actively exploited vulnerabilities, three publicly known, highlighting critical enterprise risks.
Preview image for: The Unseen Tether: How Physical Device Security Redefines Mobile Cyber Defense

The Unseen Tether: How Physical Device Security Redefines Mobile Cyber Defense

This accessory makes rugged cases obsolete by preventing drops. Discover how physical security underpins robust mobile cybersecurity and OSINT strategies.
Preview image for: Accelerating QA & DevOps: The Definitive Guide to Test Data Management Tools in 2026

Accelerating QA & DevOps: The Definitive Guide to Test Data Management Tools in 2026

Explore top TDM tools for 2026, focusing on speed, self-service, masking, CI/CD, and enterprise readiness for QA and DevOps.
Preview image for: North Korea's UNC1069 Leverages AI-Enhanced Lures in Sophisticated Cryptocurrency Heists

North Korea's UNC1069 Leverages AI-Enhanced Lures in Sophisticated Cryptocurrency Heists

UNC1069, a North Korea-linked APT, targets crypto organizations with AI-powered social engineering, exploiting Windows/macOS for financial theft.
Preview image for: Asia's Critical Cyber Blind Spot: The Pervasive Telnet Threat and Regional Inaction

Asia's Critical Cyber Blind Spot: The Pervasive Telnet Threat and Regional Inaction

Asia struggles to throttle Telnet traffic, a critical vulnerability. Only Taiwan effectively blocks this threat-ridden protocol, highlighting regional cybersecurity disparities.
Preview image for: February 2026 Patch Tuesday: Six Zero-Days Under Active Exploitation Demand Immediate Remediation

February 2026 Patch Tuesday: Six Zero-Days Under Active Exploitation Demand Immediate Remediation

Microsoft's February 2026 Patch Tuesday addresses over 50 security flaws, including six actively exploited zero-days. Urgent patching required.
Preview image for: Phorpiex Phishing Resurgence: Delivering Low-Noise Global Group Ransomware via Malicious .LNK Files

Phorpiex Phishing Resurgence: Delivering Low-Noise Global Group Ransomware via Malicious .LNK Files

High-volume Phorpiex phishing campaign deploys stealthy Low-Noise Global Group Ransomware via malicious Windows Shortcut (.LNK) files.
Preview image for: ISC Stormcast 2026: Unpacking 'Project Chimera' – A Multi-Vector APT & Quantum-Aware Threats

ISC Stormcast 2026: Unpacking 'Project Chimera' – A Multi-Vector APT & Quantum-Aware Threats

Analysis of the ISC Stormcast for Feb 11, 2026, detailing 'Project Chimera,' advanced APT tactics, and quantum-aware cybersecurity challenges.
Preview image for: AI Takes the Nuclear Watch: A Paradigm Shift in Arms Control?

AI Takes the Nuclear Watch: A Paradigm Shift in Arms Control?

Exploring AI's potential to replace nuclear treaties through satellite surveillance and advanced analytics, alongside its inherent risks.
Preview image for: CIS Benchmarks February 2026: Navigating the Evolving Cyber Threat Landscape

CIS Benchmarks February 2026: Navigating the Evolving Cyber Threat Landscape

Deep dive into CIS Benchmarks February 2026 updates, focusing on cloud security, containerization, AI/ML, and advanced threat intelligence.
Preview image for: Critical Alert: Microsoft's February 2026 Patch Tuesday Neutralizes 6 Actively Exploited Zero-Days

Critical Alert: Microsoft's February 2026 Patch Tuesday Neutralizes 6 Actively Exploited Zero-Days

Microsoft's February 2026 Patch Tuesday addresses 6 actively exploited zero-days, vital for enterprise cybersecurity.
Preview image for: Discord's Age Verification Mandate: A Deep Dive into Security and OSINT Implications

Discord's Age Verification Mandate: A Deep Dive into Security and OSINT Implications

Discord's age verification policy analyzed: security risks, data privacy concerns, OSINT challenges, and defensive strategies.
Preview image for: February 2026 Patch Tuesday: Six Zero-Days Under Active Exploitation, Five Critical Vulnerabilities Demand Immediate Action

February 2026 Patch Tuesday: Six Zero-Days Under Active Exploitation, Five Critical Vulnerabilities Demand Immediate Action

Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including six zero-days and five critical RCE/EoP flaws.
Preview image for: Reynolds Ransomware: Kernel-Level Evasion via Embedded BYOVD for EDR Disablement

Reynolds Ransomware: Kernel-Level Evasion via Embedded BYOVD for EDR Disablement

Reynolds Ransomware uses an embedded BYOVD component for kernel-level EDR evasion, escalating its destructive capabilities through privilege escalation.
Preview image for: Elevating Operational Security and Productivity: My 11-in-1 Baseus Docking Station as a Strategic Asset

Elevating Operational Security and Productivity: My 11-in-1 Baseus Docking Station as a Strategic Asset

Boost productivity and manage complex multi-monitor setups with the Baseus 11-in-1 docking station, while exploring its cybersecurity implications for researchers.
Preview image for: The Precipice of Innovation: America's 'Move Fast' AI Gambit and Global Market Risks

The Precipice of Innovation: America's 'Move Fast' AI Gambit and Global Market Risks

America's light-touch AI regulation risks global market share, fostering cybersecurity threats and eroding trust in the rapidly evolving AI landscape.
Preview image for: Lema AI Secures $24M to Revolutionize Third-Party Risk: A Deep Dive into Supply Chain Cybersecurity Innovation

Lema AI Secures $24M to Revolutionize Third-Party Risk: A Deep Dive into Supply Chain Cybersecurity Innovation

Lema AI emerges from stealth with $24M to enhance supply chain security, leveraging AI to tackle critical third-party risks.
Preview image for: Unmasking Covert Surveillance: Is Your Phone Really Listening? (Lock and Code S07E03 Re-Air)

Unmasking Covert Surveillance: Is Your Phone Really Listening? (Lock and Code S07E03 Re-Air)

Deep dive into mobile eavesdropping: separating technical reality from myths, analyzing advertising vs. true espionage threats.
Preview image for: ISC Stormcast 2026: Deconstructing a Zero-Day Orchestrated APT Campaign

ISC Stormcast 2026: Deconstructing a Zero-Day Orchestrated APT Campaign

Deep dive into the Feb 9, 2026 ISC Stormcast, analyzing a sophisticated zero-day APT campaign, its TTPs, and advanced DFIR/OSINT strategies.
Preview image for: SolarWinds Web Help Desk: Unpacking RCE Exploitation in Sophisticated Multi-Stage Intrusions

SolarWinds Web Help Desk: Unpacking RCE Exploitation in Sophisticated Multi-Stage Intrusions

Microsoft observed multi-stage attacks exploiting internet-exposed SolarWinds WHD for RCE, leading to lateral movement and high-value asset compromise.
Preview image for: Presidents' Day Tax Deal: A Cybersecurity & OSINT Deep Dive into Digital Campaigns and Threat Vectors

Presidents' Day Tax Deal: A Cybersecurity & OSINT Deep Dive into Digital Campaigns and Threat Vectors

Analyzing H&R Block's tax deal from a cybersecurity and OSINT perspective, focusing on digital forensics and threat attribution.
Preview image for: OpenAI's 2026 Hardware Secret Leaked? Dissecting the Super Bowl Earbuds Fumble

OpenAI's 2026 Hardware Secret Leaked? Dissecting the Super Bowl Earbuds Fumble

A now-deleted Reddit post hinted at OpenAI's 2026 Super Bowl earbuds reveal. We dissect the OPSEC failure.
Preview image for: Cyber-Forensics of Super Bowl 2026: Securing Your High-Stakes Streaming Experience

Cyber-Forensics of Super Bowl 2026: Securing Your High-Stakes Streaming Experience

Unpack cybersecurity risks and secure streaming strategies for Super Bowl 2026, Patriots vs. Seahawks.
Preview image for: Beyond the Screen: Unpacking the Cybersecurity Implications of a 4K Dolby Vision Projector

Beyond the Screen: Unpacking the Cybersecurity Implications of a 4K Dolby Vision Projector

Analyzing the Xgimi Horizon S Max, this article dives into the cybersecurity attack surface and OSINT opportunities of smart projectors.
Preview image for: OpenClaw Fortifies Agentic Ecosystem Security with VirusTotal Code Insight Integration

OpenClaw Fortifies Agentic Ecosystem Security with VirusTotal Code Insight Integration

OpenClaw integrates VirusTotal's advanced threat intelligence, including Code Insight, to scan all ClawHub skills, bolstering agentic AI security.
Preview image for: OSINT & Digital Forensics: Optimizing Smart TV Operational Security for Peak Performance and Reduced Attack Surface

OSINT & Digital Forensics: Optimizing Smart TV Operational Security for Peak Performance and Reduced Attack Surface

Enhance smart TV performance and bolster cybersecurity. Learn 5 critical settings to reduce attack vectors and optimize forensic readiness.
Preview image for: Moltbook Data Breach: AI Social Network Exposes Real Human PII and Behavioral Telemetry

Moltbook Data Breach: AI Social Network Exposes Real Human PII and Behavioral Telemetry

Moltbook, an AI agent social network, suffered a critical data breach, exposing sensitive human PII and behavioral data.
Preview image for: DHS Biometric Surveillance Under Scrutiny: A Deep Dive into Privacy, Security, and Algorithmic Accountability

DHS Biometric Surveillance Under Scrutiny: A Deep Dive into Privacy, Security, and Algorithmic Accountability

DHS privacy probe targets ICE and OBIM biometric tracking, examining data security, civil liberties, and algorithmic bias in immigration enforcement.
Preview image for: Critical Alert: Discontinued Edge Devices – A Gateway for State-Sponsored Cyber Espionage

Critical Alert: Discontinued Edge Devices – A Gateway for State-Sponsored Cyber Espionage

Organizations must replace unsupported edge devices, as state-sponsored threat actors actively exploit their critical vulnerabilities.
Preview image for: Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Sophisticated Apple Pay phishing combines digital lures with fake support calls to exfiltrate sensitive payment data.
Preview image for: DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

Technical analysis of DKnife, a sophisticated Chinese malware framework exploiting routers and edge devices for reconnaissance and control.
Preview image for: Unmasking the Digital Dilemma: 'Encrypt It Already' Campaign Confronts Big Tech on E2E Encryption in the AI Era

Unmasking the Digital Dilemma: 'Encrypt It Already' Campaign Confronts Big Tech on E2E Encryption in the AI Era

EFF urges Big Tech to implement E2E encryption by default, crucial for privacy amid rising AI use and advanced cyber threats.
Preview image for: China's DKnife: Unpacking the Sophisticated AitM Framework Hijacking Routers

China's DKnife: Unpacking the Sophisticated AitM Framework Hijacking Routers

Deep dive into DKnife, a China-linked AitM framework leveraging seven Linux implants to hijack routers for traffic manipulation and malware.
Preview image for: Beyond the Bargain: Deconstructing the Cybersecurity & OSINT Implications of an 85-inch Sony Bravia at Sub-$1000

Beyond the Bargain: Deconstructing the Cybersecurity & OSINT Implications of an 85-inch Sony Bravia at Sub-$1000

Analyzing the cybersecurity and OSINT implications of the 85-inch Sony Bravia, covering IoT vulnerabilities, data privacy, and threat intelligence.
Preview image for: Beyond the Horizon: Deconstructing the 2026 Cyber Threat Landscape & Advanced OSINT Strategies

Beyond the Horizon: Deconstructing the 2026 Cyber Threat Landscape & Advanced OSINT Strategies

Analyzing the evolving 2026 cyber threat landscape, supply chain vulnerabilities, APTs, and advanced OSINT for proactive defense.
Preview image for: Cyber Startup Programme 2026: Unleashing Next-Gen Innovation Against Evolving Threats

Cyber Startup Programme 2026: Unleashing Next-Gen Innovation Against Evolving Threats

Infosecurity Europe 2026 debuts a Cyber Startup Programme, fostering innovation, connecting early-stage companies with investors, and showcasing emerging cybersecurity technologies.
Preview image for: EnCase Driver's Ghost in the Machine: Weaponized for EDR Kill Chains

EnCase Driver's Ghost in the Machine: Weaponized for EDR Kill Chains

Expired EnCase driver weaponized for EDR bypass, privilege escalation, and persistence. A critical BYOVD threat.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics