Marcus Thorne

Senior Cybersecurity Analyst and Digital Privacy Advocate with over 15 years of experience in network security. Marcus specializes in threat intelligence and data protection strategies.

Preview image for: Critical Alert: Discontinued Edge Devices – A Gateway for State-Sponsored Cyber Espionage

Critical Alert: Discontinued Edge Devices – A Gateway for State-Sponsored Cyber Espionage

Organizations must replace unsupported edge devices, as state-sponsored threat actors actively exploit their critical vulnerabilities.
Preview image for: Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Vishing for Victory: Deconstructing the Advanced Apple Pay Phishing Campaign Exploiting Fake Support Calls

Sophisticated Apple Pay phishing combines digital lures with fake support calls to exfiltrate sensitive payment data.
Preview image for: DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

Technical analysis of DKnife, a sophisticated Chinese malware framework exploiting routers and edge devices for reconnaissance and control.
Preview image for: Unmasking the Digital Dilemma: 'Encrypt It Already' Campaign Confronts Big Tech on E2E Encryption in the AI Era

Unmasking the Digital Dilemma: 'Encrypt It Already' Campaign Confronts Big Tech on E2E Encryption in the AI Era

EFF urges Big Tech to implement E2E encryption by default, crucial for privacy amid rising AI use and advanced cyber threats.
Preview image for: China's DKnife: Unpacking the Sophisticated AitM Framework Hijacking Routers

China's DKnife: Unpacking the Sophisticated AitM Framework Hijacking Routers

Deep dive into DKnife, a China-linked AitM framework leveraging seven Linux implants to hijack routers for traffic manipulation and malware.
Preview image for: Beyond the Bargain: Deconstructing the Cybersecurity & OSINT Implications of an 85-inch Sony Bravia at Sub-$1000

Beyond the Bargain: Deconstructing the Cybersecurity & OSINT Implications of an 85-inch Sony Bravia at Sub-$1000

Analyzing the cybersecurity and OSINT implications of the 85-inch Sony Bravia, covering IoT vulnerabilities, data privacy, and threat intelligence.
Preview image for: Beyond the Horizon: Deconstructing the 2026 Cyber Threat Landscape & Advanced OSINT Strategies

Beyond the Horizon: Deconstructing the 2026 Cyber Threat Landscape & Advanced OSINT Strategies

Analyzing the evolving 2026 cyber threat landscape, supply chain vulnerabilities, APTs, and advanced OSINT for proactive defense.
Preview image for: Cyber Startup Programme 2026: Unleashing Next-Gen Innovation Against Evolving Threats

Cyber Startup Programme 2026: Unleashing Next-Gen Innovation Against Evolving Threats

Infosecurity Europe 2026 debuts a Cyber Startup Programme, fostering innovation, connecting early-stage companies with investors, and showcasing emerging cybersecurity technologies.
Preview image for: EnCase Driver's Ghost in the Machine: Weaponized for EDR Kill Chains

EnCase Driver's Ghost in the Machine: Weaponized for EDR Kill Chains

Expired EnCase driver weaponized for EDR bypass, privilege escalation, and persistence. A critical BYOVD threat.
Preview image for: Theonlinesearch.com: A Deep Dive into Browser Hijacking and Advanced Remediation Strategies

Theonlinesearch.com: A Deep Dive into Browser Hijacking and Advanced Remediation Strategies

Technical guide to identifying, removing, and preventing Theonlinesearch.com browser redirects caused by malicious extensions and browser hijacking tactics.
Preview image for: Securing the Sonic Perimeter: An OSINT & Forensics Analysis of Smart Soundbar Deployment

Securing the Sonic Perimeter: An OSINT & Forensics Analysis of Smart Soundbar Deployment

Analyzing flagship soundbars as IoT attack surfaces, focusing on network reconnaissance, data privacy, and forensic investigation techniques.
Preview image for: Anomalous Phishing URLs: Unmasking Evasion Tactics in Recent Campaigns (Thu, Feb 5th)

Anomalous Phishing URLs: Unmasking Evasion Tactics in Recent Campaigns (Thu, Feb 5th)

Analyzing the surge of 'broken' phishing URLs observed on Feb 5th, revealing sophisticated evasion and obfuscation techniques by threat actors.
Preview image for: GitHub Codespaces: Unmasking RCE Vulnerabilities via Malicious Repository Injections

GitHub Codespaces: Unmasking RCE Vulnerabilities via Malicious Repository Injections

Deep dive into RCE threats in GitHub Codespaces, detailing attack vectors, exploitation, and robust mitigation strategies.
Preview image for: Cyber Success Trifecta: Education, Certifications & Experience in the AI Era

Cyber Success Trifecta: Education, Certifications & Experience in the AI Era

Colonel Pulikkathara emphasizes education, certifications, and experience as cornerstones for cybersecurity success amidst AI evolution.
Preview image for: Critical N8n Sandbox Escape: A Gateway to Full Server Compromise and Data Exfiltration

Critical N8n Sandbox Escape: A Gateway to Full Server Compromise and Data Exfiltration

Severe N8n sandbox escape allows arbitrary command execution, credential theft, and full server compromise. Immediate patching advised.
Preview image for: AI-Enabled Voice & Virtual Meeting Fraud Explodes 1210%: A Deep Dive into Advanced Threat Vectors

AI-Enabled Voice & Virtual Meeting Fraud Explodes 1210%: A Deep Dive into Advanced Threat Vectors

Unprecedented surge in AI-powered voice and virtual meeting fraud. Researchers analyze deepfake tactics, detection challenges, and advanced countermeasures.
Preview image for: Critical n8n RCE Flaw CVE-2026-25049: A Deeper Dive into Sanitization Bypass and System Command Execution

Critical n8n RCE Flaw CVE-2026-25049: A Deeper Dive into Sanitization Bypass and System Command Execution

Critical n8n flaw CVE-2026-25049 enables arbitrary system command execution, bypassing previous sanitization fixes via malicious workflows.
Preview image for: Global SystemBC Botnet Found Active Across 10,000 Infected Systems: A Critical Threat to Sensitive Infrastructure

Global SystemBC Botnet Found Active Across 10,000 Infected Systems: A Critical Threat to Sensitive Infrastructure

SystemBC botnet infects 10,000 IPs, posing severe risks to government infrastructure. Analysis covers its capabilities and mitigation strategies.
Preview image for: Microsoft's Sentinel: Detecting Covert Backdoors in Open-Weight LLMs

Microsoft's Sentinel: Detecting Covert Backdoors in Open-Weight LLMs

Microsoft unveils a lightweight scanner leveraging three signals to detect backdoors in open-weight LLMs, enhancing AI trust and security.
Preview image for: CISA Warns: VMware ESXi Sandbox Escape Actively Exploited by Ransomware Gangs

CISA Warns: VMware ESXi Sandbox Escape Actively Exploited by Ransomware Gangs

CISA confirms ransomware gangs exploit a high-severity VMware ESXi sandbox escape, previously a zero-day, urging immediate patching and defense.
Preview image for: Persistent Peril: Grok's Continued Generation of Unsafe Content Underscores Deep-Seated AI Safety Challenges

Persistent Peril: Grok's Continued Generation of Unsafe Content Underscores Deep-Seated AI Safety Challenges

Grok's ongoing generation of sexualized images, even concerning vulnerable subjects, reveals critical failures in AI safety and content moderation.
Preview image for: The SLSH Menace: Unmasking the Aggressive Tactics of Scattered Lapsus ShinyHunters

The SLSH Menace: Unmasking the Aggressive Tactics of Scattered Lapsus ShinyHunters

Analyzing Scattered Lapsus ShinyHunters' aggressive data extortion, harassment, and swatting tactics, and outlining robust defensive strategies.
Preview image for: APT28's Lightning Strike: Weaponizing Microsoft Office RTF Zero-Day in 72 Hours

APT28's Lightning Strike: Weaponizing Microsoft Office RTF Zero-Day in 72 Hours

APT28 rapidly weaponized a Microsoft Office RTF vulnerability in three days, launching sophisticated multistage attacks.
Preview image for: DockerDash: Critical Ask Gordon AI Flaw in Docker Desktop/CLI Exploited via Image Metadata

DockerDash: Critical Ask Gordon AI Flaw in Docker Desktop/CLI Exploited via Image Metadata

Docker patched a critical Ask Gordon AI flaw (DockerDash) allowing code execution and data exfiltration via malicious image metadata.
Preview image for: Moltbot/OpenClaw Under Siege: Hundreds of Malicious Crypto Trading Add-Ons Uncovered on ClawHub

Moltbot/OpenClaw Under Siege: Hundreds of Malicious Crypto Trading Add-Ons Uncovered on ClawHub

A security researcher found 386 malicious crypto trading 'skills' on ClawHub for OpenClaw, posing severe financial and data theft risks.
Preview image for: CISA Emergency Directive: Critical SolarWinds RCE Exploited in the Wild

CISA Emergency Directive: Critical SolarWinds RCE Exploited in the Wild

CISA flags critical SolarWinds Web Help Desk RCE flaw (CVE-2023-40000) as actively exploited, urging immediate patching.
Preview image for: Attackers Harvest Dropbox Logins Via Fake PDF Lures: A Deep Dive into Corporate Phishing

Attackers Harvest Dropbox Logins Via Fake PDF Lures: A Deep Dive into Corporate Phishing

Analyzing a malware-free phishing campaign leveraging fake PDF "request orders" to steal corporate Dropbox credentials.
Preview image for: APT28 Unleashes

APT28 Unleashes "Operation Neusploit" with Microsoft Office Zero-Day Exploit (CVE-2026-21509)

APT28 weaponizes CVE-2026-21509 in Microsoft Office for espionage, targeting Ukraine, Slovakia, Romania in "Operation Neusploit."
Preview image for: New GlassWorm Attack Leverages Compromised OpenVSX Extensions to Target macOS Developers and Crypto Assets

New GlassWorm Attack Leverages Compromised OpenVSX Extensions to Target macOS Developers and Crypto Assets

GlassWorm's new macOS attack exploits compromised OpenVSX extensions, stealing passwords, crypto-wallet data, and developer credentials.
Preview image for: Manifest V3: A Catalyst for Re-architecting Browser Guard's Defense Mechanisms

Manifest V3: A Catalyst for Re-architecting Browser Guard's Defense Mechanisms

Manifest V3 forced Browser Guard to rebuild its core. Discover how this led to enhanced performance, privacy, and security.
Preview image for: Unmasking the ClawHub Threat: 341 Malicious Skills Jeopardize OpenClaw Users with Data Theft Campaigns

Unmasking the ClawHub Threat: 341 Malicious Skills Jeopardize OpenClaw Users with Data Theft Campaigns

Koi Security uncovers 341 malicious ClawHub skills, exposing OpenClaw users to supply chain data theft risks.
Preview image for: Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Malicious MoltBot Onslaught: Weaponized AI Skills Pushing Password Stealers

Over 230 malicious OpenClaw/MoltBot AI skills distributed, pushing password-stealing malware via official registries and GitHub.
Preview image for: Seamless Scam Defense: Malwarebytes Integrates with ChatGPT for Real-time Threat Analysis

Seamless Scam Defense: Malwarebytes Integrates with ChatGPT for Real-time Threat Analysis

Malwarebytes in ChatGPT offers instant scam checks and threat analysis, a first in cybersecurity integration.
Preview image for: Milano Cortina 2026: Navigating the Geopolitical and Cyber Terrain of Olympic Security

Milano Cortina 2026: Navigating the Geopolitical and Cyber Terrain of Olympic Security

Foreign security forces, including ICE and Qatari contingents, raise significant cybersecurity, privacy, and sovereignty concerns for Italy's Winter Olympics.
Preview image for: Exposed MongoDB: A Persistent Magnet for Automated Data Extortion Attacks

Exposed MongoDB: A Persistent Magnet for Automated Data Extortion Attacks

Automated attacks relentlessly target exposed MongoDB instances, demanding low ransoms for data restoration. A critical cybersecurity threat.
Preview image for: ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

ISC Stormcast 9790: AI-Driven Phishing & Covert Exfiltration - The 2026 Threat Landscape

Analyzing advanced AI phishing, social engineering, and covert data exfiltration methods discussed in ISC Stormcast 9790.
Preview image for: Unmasking the Architects: Who Operates the Badbox 2.0 Botnet?

Unmasking the Architects: Who Operates the Badbox 2.0 Botnet?

Kimwolf botnet claims compromise of Badbox 2.0 C2, potentially revealing operators of the vast Android TV box botnet.
Preview image for: Apple's New Frontier in Privacy: Obfuscating Cellular Location Data

Apple's New Frontier in Privacy: Obfuscating Cellular Location Data

Apple introduces a new feature limiting cellular network location precision, enhancing user privacy against carrier tracking on iPhones and iPads.
Preview image for: RedKitten Unleashed: Iran-Linked Cyber Campaign Targets Human Rights Defenders Amidst Unrest

RedKitten Unleashed: Iran-Linked Cyber Campaign Targets Human Rights Defenders Amidst Unrest

RedKitten, an Iran-linked cyber campaign, targets human rights NGOs and activists documenting abuses amidst 2025-2026 unrest, using sophisticated social engineering.
Preview image for: Unmasking the Shadows: The Cybersecurity Implications of a 'Personal Hacker' and Evolving Digital Threats

Unmasking the Shadows: The Cybersecurity Implications of a 'Personal Hacker' and Evolving Digital Threats

Examine the cybersecurity implications of a 'personal hacker,' advanced AI agents like OpenClaw, global cybercrime, and crypto theft.
Preview image for: The Algorithmic Irony: Trusting ChatGPT Amidst Ad Integration – A Cybersecurity Researcher's Perspective

The Algorithmic Irony: Trusting ChatGPT Amidst Ad Integration – A Cybersecurity Researcher's Perspective

Analyzing cybersecurity risks introduced by ChatGPT's ad rollout, challenging OpenAI's trust claims from a defensive research standpoint.
Preview image for: AI Superpower at Risk: The Linwei Ding Conviction and the Escalating Threat of AI IP Theft

AI Superpower at Risk: The Linwei Ding Conviction and the Escalating Threat of AI IP Theft

Ex-Google engineer convicted for stealing AI supercomputer data, highlighting critical risks of insider threat and intellectual property espionage.
Preview image for: Torq Propels SOCs Beyond SOAR with AI-Powered Hyperautomation: A Paradigm Shift in Cyber Defense

Torq Propels SOCs Beyond SOAR with AI-Powered Hyperautomation: A Paradigm Shift in Cyber Defense

Torq's $1.2B valuation fuels AI-driven hyperautomation, revolutionizing SOC operations by transcending traditional SOAR limitations.
Preview image for: Mandiant Uncovers ShinyHunters' Sophisticated SSO & MFA Phishing Campaign: A Deep Dive into Cloud Data Theft

Mandiant Uncovers ShinyHunters' Sophisticated SSO & MFA Phishing Campaign: A Deep Dive into Cloud Data Theft

Mandiant details how ShinyHunters abuses SSO and MFA via vishing and phishing to steal cloud data.
Preview image for: Mandiant Uncovers Sophisticated ShinyHunters Vishing Campaign Targeting MFA-Protected SaaS Platforms

Mandiant Uncovers Sophisticated ShinyHunters Vishing Campaign Targeting MFA-Protected SaaS Platforms

Mandiant reveals ShinyHunters-style vishing attacks bypass MFA to breach SaaS, emphasizing advanced social engineering and credential harvesting.
Preview image for: 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child

2026: The Year Agentic AI Becomes the Attack-Surface Poster Child

Agentic AI will dominate cyber threats by 2026, creating new, autonomous attack surfaces. An analysis for defenders.
Preview image for: Researchers Uncover Sophisticated Chrome Extensions: Affiliate Fraud & ChatGPT Credential Theft

Researchers Uncover Sophisticated Chrome Extensions: Affiliate Fraud & ChatGPT Credential Theft

Malicious Chrome extensions identified, hijacking affiliate links, exfiltrating data, and stealing OpenAI ChatGPT authentication tokens.
Preview image for: Crypto's Dark Surge: A Record $158 Billion in Illicit Flows Threatens Digital Trust

Crypto's Dark Surge: A Record $158 Billion in Illicit Flows Threatens Digital Trust

Illicit crypto flows hit a staggering $158B in 2025, reversing trends. This article analyzes the surge, impact, and defensive strategies.
Preview image for: Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Weaponizing Trust: Google Presentations Exploited in Vivaldi Webmail Phishing Campaign

Attackers leverage Google Presentations for phishing Vivaldi Webmail users, bypassing security and harvesting credentials via trusted domains.
Preview image for: Labyrinth Chollima Evolves: Dissecting the Tripartite North Korean Threat

Labyrinth Chollima Evolves: Dissecting the Tripartite North Korean Threat

CrowdStrike assesses Labyrinth Chollima fractured into three North Korean APTs, specializing in finance, espionage, and disruption.
Preview image for: Badges, Bytes, and Blackmail: Unmasking Cybercriminals and the Digital Hunt

Badges, Bytes, and Blackmail: Unmasking Cybercriminals and the Digital Hunt

An in-depth look at how law enforcement identifies, tracks, and apprehends cybercriminals, revealing their origins, roles, and common mistakes.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics