Marcus Thorne

Senior Cybersecurity Analyst and Digital Privacy Advocate with over 15 years of experience in network security. Marcus specializes in threat intelligence and data protection strategies.

Preview image for: FBI & CISA Sound Alarm: Russian APTs Exploit Social Engineering to Hijack Signal & WhatsApp Accounts

FBI & CISA Sound Alarm: Russian APTs Exploit Social Engineering to Hijack Signal & WhatsApp Accounts

FBI, CISA, and European agencies warn of Russian APTs using sophisticated social engineering to hijack secure messaging apps.
Preview image for: Evading the Digital Net: Six Months of Hyper-Vigilance Against State-Sponsored OSINT

Evading the Digital Net: Six Months of Hyper-Vigilance Against State-Sponsored OSINT

Analyzing the extreme cybersecurity and OSINT challenges of maintaining digital anonymity against state surveillance for extended periods.
Preview image for: Detecting Rogue IP KVMs: A Critical Cybersecurity Imperative

Detecting Rogue IP KVMs: A Critical Cybersecurity Imperative

Uncover stealthy rogue IP KVMs with advanced network, endpoint, and forensic techniques to prevent unauthorized remote access and APTs.
Preview image for: Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox's Evolving Threat Landscape: A Deep Dive into Dual Espionage Cyber Campaigns

Silver Fox group shifts from tax lures to WhatsApp stealers, blending espionage with phishing for dual-purpose data theft and intelligence gathering.
Preview image for: Amazon Spring Sale 2026: Real-time Threat Intelligence & OSINT for Proactive Cybersecurity Defense

Amazon Spring Sale 2026: Real-time Threat Intelligence & OSINT for Proactive Cybersecurity Defense

Analyzing the cyber threat landscape during Amazon's Spring Sale 2026, focusing on phishing, supply chain risks, and proactive defense strategies.
Preview image for: The Enduring Paradox: Why Legacy Vulnerabilities Remain Attackers' Goldmines Amidst Rapid Zero-Day Weaponization

The Enduring Paradox: Why Legacy Vulnerabilities Remain Attackers' Goldmines Amidst Rapid Zero-Day Weaponization

Old and new vulnerabilities simultaneously exploited. Rapid weaponization meets long-term exposure, demanding urgent defensive strategies.
Preview image for: FriendlyDealer Unmasked: Sophisticated App Store Impersonation Pushing Unvetted Gambling Apps

FriendlyDealer Unmasked: Sophisticated App Store Impersonation Pushing Unvetted Gambling Apps

FriendlyDealer creates 1,500+ fake app stores, mirroring Google/Apple, to distribute unvetted, potentially malicious gambling apps.
Preview image for: Unpacking Advanced Persistent Threats: Insights from ISC Stormcast 9862 on Evolving Cyber Warfare Tactics

Unpacking Advanced Persistent Threats: Insights from ISC Stormcast 9862 on Evolving Cyber Warfare Tactics

Deep dive into sophisticated cyber threats, advanced persistent tactics, and critical defensive strategies from the ISC Stormcast.
Preview image for: The AI Security Blind Spot: Why Most Cybersecurity Teams Underestimate Attack Containment Speed

The AI Security Blind Spot: Why Most Cybersecurity Teams Underestimate Attack Containment Speed

Cybersecurity teams struggle to contain AI system attacks due to responsibility confusion and lack of specific understanding.
Preview image for: The Phantom Copyright: Infostealers Masquerading in Deceptive Legal Notices

The Phantom Copyright: Infostealers Masquerading in Deceptive Legal Notices

Sophisticated phishing campaign deploys infostealers via fake copyright notices, targeting critical sectors with advanced evasion techniques.
Preview image for: North Korean APT Operative Busted: VPN Configuration Error Exposes Remote IT Infiltration

North Korean APT Operative Busted: VPN Configuration Error Exposes Remote IT Infiltration

LevelBlue research reveals North Korean operative's remote IT role, funding weapons via cybercrime, exposed by critical VPN slip.
Preview image for: Beyond Aesthetics: Deconstructing USB Port Colors for Advanced Cybersecurity & OSINT

Beyond Aesthetics: Deconstructing USB Port Colors for Advanced Cybersecurity & OSINT

USB port colors reveal critical capabilities and vulnerabilities. Learn how to leverage this knowledge for cybersecurity and OSINT.
Preview image for: Booz Allen's Vellox: Countering AI-Speed Cyber Threats with AI-Native Defense for Critical Infrastructure

Booz Allen's Vellox: Countering AI-Speed Cyber Threats with AI-Native Defense for Critical Infrastructure

Booz Allen's Vellox suite pioneers AI-native cyber defense, combating AI-speed threats to U.S. critical infrastructure and national security.
Preview image for: LAPSUS$ Claims AstraZeneca Breach: Unpacking the Alleged Data Exfiltration and Enterprise Risk

LAPSUS$ Claims AstraZeneca Breach: Unpacking the Alleged Data Exfiltration and Enterprise Risk

LAPSUS$ alleges AstraZeneca breach, offering source code, credentials, cloud configs, and employee data. Analyzing the enterprise cybersecurity implications.
Preview image for: Catastrophic Cascades: When 'Simple' Network Glitches Derail Critical Infrastructure

Catastrophic Cascades: When 'Simple' Network Glitches Derail Critical Infrastructure

Investigating how basic network failures can halt train operations, exposing critical infrastructure's digital vulnerabilities.
Preview image for: The Cybersecurity Analyst's Verdict: Why I Entrust My High-Value Tech to $5, 240W Magnetic USB-C Connectors

The Cybersecurity Analyst's Verdict: Why I Entrust My High-Value Tech to $5, 240W Magnetic USB-C Connectors

Unpacking the technical rationale behind trusting budget-friendly 240W magnetic USB-C connectors for critical device protection.
Preview image for: Post-Breach Resilience: How DeleteMe Became My Digital Shield Against PII Exposure

Post-Breach Resilience: How DeleteMe Became My Digital Shield Against PII Exposure

After multiple data breaches, I tried DeleteMe. Here's a technical deep dive into its efficacy and areas for advanced improvement.
Preview image for: Critical Week in Review: ScreenConnect Exploits & SharePoint Flaws Expose Enterprise Networks to Pervasive Threats

Critical Week in Review: ScreenConnect Exploits & SharePoint Flaws Expose Enterprise Networks to Pervasive Threats

Analyzing critical ScreenConnect and SharePoint vulnerabilities, their impact on enterprise security, and essential proactive defense strategies for robust cyber resilience.
Preview image for: Biometric Redlining: NYC's Stance Against Surveillance Pricing and Profiling

Biometric Redlining: NYC's Stance Against Surveillance Pricing and Profiling

NYC targets biometric tracking to prevent discriminatory surveillance pricing and customer profiling, safeguarding digital identity and privacy.
Preview image for: Bridging the Divide: Unleashing Cross-Platform Secure Sharing on Android via Unified Quick Share

Bridging the Divide: Unleashing Cross-Platform Secure Sharing on Android via Unified Quick Share

Technical analysis of Android's new Quick Share for AirDrop interoperability, enabling secure cross-platform file transfers and its security implications.
Preview image for: FBI, CISA Issue Urgent PSA: Russian Intelligence Escalates Campaign Against Encrypted Messaging Apps

FBI, CISA Issue Urgent PSA: Russian Intelligence Escalates Campaign Against Encrypted Messaging Apps

FBI and CISA warn about Russian intelligence targeting Signal and other messaging apps, echoing European alerts on advanced cyber espionage.
Preview image for: Cyberattack Paralyses Breathalyzer Firm: A Deep Dive into Critical Infrastructure Vulnerabilities and Evolving Threat Landscapes

Cyberattack Paralyses Breathalyzer Firm: A Deep Dive into Critical Infrastructure Vulnerabilities and Evolving Threat Landscapes

A cyberattack cripples a breathalyzer firm, leaving drivers stranded and exposing critical infrastructure vulnerabilities.
Preview image for: GSocket Backdoor Unleashed: Deep Dive into a Malicious Bash Script Campaign

GSocket Backdoor Unleashed: Deep Dive into a Malicious Bash Script Campaign

Analysis of a GSocket backdoor delivered via Bash script, detailing its mechanisms, impact, and advanced forensic strategies.
Preview image for: 20 Hours to Catastrophe: How Hackers Exploited a Critical Langflow CVE in Under a Day

20 Hours to Catastrophe: How Hackers Exploited a Critical Langflow CVE in Under a Day

Threat actors rapidly exploited a critical Langflow CVE within 20 hours, highlighting urgent AI supply chain security risks.
Preview image for: Feds Dismantle Massive IoT Botnet Empire: A Technical Deep Dive into the Aisuru, Kimwolf, JackSkid, and Mossad Takedown

Feds Dismantle Massive IoT Botnet Empire: A Technical Deep Dive into the Aisuru, Kimwolf, JackSkid, and Mossad Takedown

US, Canadian, German authorities disrupt four major IoT botnets (Aisuru, Kimwolf, JackSkid, Mossad) behind record DDoS attacks.
Preview image for: Patch Now: Critical Unauthenticated RCE Flaw in Oracle Fusion Middleware Demands Immediate Action

Patch Now: Critical Unauthenticated RCE Flaw in Oracle Fusion Middleware Demands Immediate Action

Urgent patch required for Oracle Fusion Middleware. Critical RCE vulnerability allows unauthenticated attackers full system control.
Preview image for: Critical Compromise: Trivy GitHub Actions Hijacked, 75 Tags Breached to Exfiltrate CI/CD Secrets

Critical Compromise: Trivy GitHub Actions Hijacked, 75 Tags Breached to Exfiltrate CI/CD Secrets

Trivy GitHub Actions compromised again, 75 tags hijacked to steal CI/CD secrets, highlighting critical supply chain vulnerabilities.
Preview image for: Roku's Howdy Service: Unpacking the Cybersecurity and OSINT Implications of Ad-Free Streaming and Disney Content

Roku's Howdy Service: Unpacking the Cybersecurity and OSINT Implications of Ad-Free Streaming and Disney Content

Analyzing Roku's Howdy ad-free streaming with Disney, its data footprint, security risks, and OSINT value for researchers.
Preview image for: DOJ's Decisive Strike: Dismantling the Aisuru, Kimwolf, JackSkid, and Mossad Botnet Nexus

DOJ's Decisive Strike: Dismantling the Aisuru, Kimwolf, JackSkid, and Mossad Botnet Nexus

Justice Department's global operation dismantled Aisuru, Kimwolf, JackSkid, and Mossad botnets, severing control over 3 million compromised devices.
Preview image for: Rapid7's Exposure Command: Revolutionizing Cloud Risk with Runtime Validation and DSPM

Rapid7's Exposure Command: Revolutionizing Cloud Risk with Runtime Validation and DSPM

Rapid7's Exposure Command now validates and prioritizes exploitable cloud risks via runtime analysis and DSPM, enhancing proactive security.
Preview image for: US Takes Decisive Action Against Record-Breaking Botnets: Aisuru, Kimwolf, JackSkid, Mossad Neutralized

US Takes Decisive Action Against Record-Breaking Botnets: Aisuru, Kimwolf, JackSkid, Mossad Neutralized

US Justice Department dismantles Aisuru, Kimwolf, JackSkid, and Mossad botnets, infecting over 3 million devices globally.
Preview image for: Unpacking the 2026 Threat Landscape: AI-Driven Deception, Supply Chain Fortification, and Advanced C2 Evasion

Unpacking the 2026 Threat Landscape: AI-Driven Deception, Supply Chain Fortification, and Advanced C2 Evasion

Analyzing ISC Stormcast Fri, Mar 20th, 2026: AI-driven phishing, supply chain vulnerabilities, C2 evasion, and proactive defense strategies for researchers.
Preview image for: Ransomware Affiliate Leaks 'The Gentlemen' Operations: FortiGate Exploits, BYOVD, and Qilin RaaS Deconstructed

Ransomware Affiliate Leaks 'The Gentlemen' Operations: FortiGate Exploits, BYOVD, and Qilin RaaS Deconstructed

Hastalamuerte's leak exposes 'The Gentlemen' RaaS tactics: FortiGate exploits, BYOVD evasion, Qilin operations. Critical intelligence for defense.
Preview image for: EU Unleashes Sanctions: A Deep Dive into Cyber Deterrence Against State-Sponsored Threats from China and Iran

EU Unleashes Sanctions: A Deep Dive into Cyber Deterrence Against State-Sponsored Threats from China and Iran

EU sanctions Chinese and Iranian entities for cyberattacks, fortifying its cyber defense against state-sponsored threats.
Preview image for: ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse & LiveChat Phishing Campaigns Unpacked

ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse & LiveChat Phishing Campaigns Unpacked

Deep dive into FortiGate RaaS, Citrix exploits, MCP abuse, and LiveChat phishing. Uncover persistent, sophisticated cyber threats.
Preview image for: Solana-Powered Exfiltration: Unpacking the Malicious Windsurf IDE Extension Threat

Solana-Powered Exfiltration: Unpacking the Malicious Windsurf IDE Extension Threat

Bitdefender discovers a fake Windsurf IDE extension leveraging Solana blockchain for sophisticated developer credential theft. A critical threat analysis.
Preview image for: AI-Powered Tab Management: A New Frontier in Digital Workflow & OSINT Efficiency

AI-Powered Tab Management: A New Frontier in Digital Workflow & OSINT Efficiency

Discover how AI revolutionizes browser tab organization, boosting research efficiency and sharpening OSINT capabilities.
Preview image for: Cisco's Vulnerability Surge: Unmasking the Deeper Strategic Implications

Cisco's Vulnerability Surge: Unmasking the Deeper Strategic Implications

Cisco's rapid patch response masks deeper concerns about sophisticated threat actor head starts and potential widespread compromise.
Preview image for: Unveiling Intent-Based Controls: The Next Frontier in AI Agent Security

Unveiling Intent-Based Controls: The Next Frontier in AI Agent Security

Token Security pioneers intent-based controls, aligning AI agent permissions with purpose to secure autonomous systems in enterprise environments.
Preview image for: Adminer Under Siege: Unpacking the Rise of Database Management Scans on March 18th

Adminer Under Siege: Unpacking the Rise of Database Management Scans on March 18th

Rising Adminer scans observed March 18th signal a shift in attacker focus from phpMyAdmin, demanding adaptive defense strategies.
Preview image for: Critical Ubuntu Snap Flaw: CVE-2026-3888 Enables Local Root Privilege Escalation via Timing Attack

Critical Ubuntu Snap Flaw: CVE-2026-3888 Enables Local Root Privilege Escalation via Timing Attack

Critical Ubuntu snap vulnerability (CVE-2026-3888) allows local attackers to gain root access via a timing-based exploit.
Preview image for: The Silent Breach: Why Attackers Are Logging In, Not Breaking In – A Deep Dive into Credential Theft in H2 2025

The Silent Breach: Why Attackers Are Logging In, Not Breaking In – A Deep Dive into Credential Theft in H2 2025

Credential theft surged in H2 2025, driven by infostealer malware and AI-enabled social engineering. This article explores defensive strategies.
Preview image for: RSAC 2026: Tony Sager's Strategic Radar – Navigating the Nexus of AI, APTs, and Post-Quantum Security

RSAC 2026: Tony Sager's Strategic Radar – Navigating the Nexus of AI, APTs, and Post-Quantum Security

Tony Sager outlines his RSAC 2026 agenda, focusing on AI, APTs, supply chain security, and next-gen DFIR in a dynamic threat landscape.
Preview image for: CTG Unveils Revolutionary Cyber Resilience Scoring Dashboard: Quantifying Risk for Proactive Defense

CTG Unveils Revolutionary Cyber Resilience Scoring Dashboard: Quantifying Risk for Proactive Defense

CTG's new dashboard quantifies cyber risk, prioritizes remediation, and tracks measurable security improvement within its CSAF framework.
Preview image for: URGENT THREAT ALERT: Sophisticated 'Fake Pudgy World' Phishing Campaign Targets Crypto Wallets

URGENT THREAT ALERT: Sophisticated 'Fake Pudgy World' Phishing Campaign Targets Crypto Wallets

Highly technical analysis of a fake Pudgy World site phishing crypto passwords, detailing modus operandi, IoCs, and defensive strategies.
Preview image for: Unmasking the Ghost in the Machine: IPv4-Mapped IPv6 Addresses in Cyber Attacks

Unmasking the Ghost in the Machine: IPv4-Mapped IPv6 Addresses in Cyber Attacks

Exploitation of IPv4-mapped IPv6 addresses for obfuscation by threat actors, analyzing technical underpinnings, impact on forensics, and mitigation strategies.
Preview image for: CursorJack: Unmasking Code Execution Risk in AI Dev Environments via Malicious Deep Links

CursorJack: Unmasking Code Execution Risk in AI Dev Environments via Malicious Deep Links

CursorJack exposes critical code execution risk in AI IDEs through malicious MCP deeplinks, enabling user-approved arbitrary code execution.
Preview image for: Exploiting the Amazon Spring Sale 2026: A Cybersecurity & OSINT Deep Dive into Smart TV Vulnerabilities and Threat Actor Attribution

Exploiting the Amazon Spring Sale 2026: A Cybersecurity & OSINT Deep Dive into Smart TV Vulnerabilities and Threat Actor Attribution

Analyze Amazon's 2026 Spring Sale through a cybersecurity lens, exploring smart TV attack surfaces, supply chain risks, and OSINT for threat intelligence.
Preview image for: Zero Lessons Learned: Convicted Scammer Allegedly Orchestrates New Phishing Campaign from Federal Prison

Zero Lessons Learned: Convicted Scammer Allegedly Orchestrates New Phishing Campaign from Federal Prison

Convicted scammer Kwamaine Jerell Ford allegedly ran a sophisticated athlete-focused phishing scam from federal prison, compromising iCloud and MFA.
Preview image for: The Human Face of AI Fraud: Unmasking the Exploitation of Models in Sophisticated Scams

The Human Face of AI Fraud: Unmasking the Exploitation of Models in Sophisticated Scams

Models recruited via Telegram are exploited to create AI personas for advanced deepfake scams, demanding robust OSINT and digital forensics.
Preview image for: Unmasking the `/proxy/` Probes: A Deep Dive into Honeypot Detections and Threat Actor Reconnaissance on March 16th

Unmasking the `/proxy/` Probes: A Deep Dive into Honeypot Detections and Threat Actor Reconnaissance on March 16th

Honeypots detected widespread `/proxy/` URL scans on March 16th, revealing evolving threat actor reconnaissance for open proxy exploitation.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics