Compromised

Home/Compromised
21 10, 2024

GHOSTPULSE Malware Leverages PNG Pixel Structure for Evasion

By | 2024-11-05T23:47:25+05:30 October 21st, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

PNG files are popular and widely used on the internet, making them a tempting target [...]

21 10, 2024

Hackers Impersonate ESET to Distribute Wiper Malware

By | 2024-10-28T23:15:51+05:30 October 21st, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Hackers posed as ESET to spread wiper malware via phishing emails starting October 8, 2024. [...]

21 10, 2024

Hackers use Bumblebee malware to infiltrate corporate networks

By | 2024-11-19T00:36:36+05:30 October 21st, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Bumblebee malware has reemerged, threatening corporate networks globally, following its first sighting since Europol’s May [...]

8 10, 2024

Cacti vulnerability allows attackers to execute remote code

By | 2024-10-14T04:22:39+05:30 October 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow [...]

2 10, 2024

Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks

By | 2024-11-28T23:53:59+05:30 October 2nd, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Hackers are exploiting Docker Swarm, Kubernetes, and SSH servers, targeting Docker API vulnerabilities as the [...]

Subscribe to our newsletter to receive security tips everday!