Compromised

Home/Compromised
9 07, 2024

Jenkins Script Console used for cryptocurrency mining attacks by hackers

By | 2024-08-22T21:54:32+05:30 July 9th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Security Advisory, Security Update|

Researchers discovered that attackers can exploit improperly configured Jenkins Script Console for criminal activities like [...]

8 07, 2024

Info-Stealing Malware Posing as Accessibility Tools and Chrome Extensions

By | 2024-07-09T23:24:12+05:30 July 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

The first half of 2024 has witnessed a notable surge in info-stealing malware masquerading as [...]

8 07, 2024

Orcinius Trojan Targets Users Through Dropbox & Google Docs

By | 2024-07-09T23:05:29+05:30 July 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

A new multi-stage trojan, "Orcinius," exploits Dropbox and Google Docs. It starts with an Excel [...]

5 07, 2024

ScreenConnect Remote Access Client Exploited by Hackers to Deploy AsyncRAT

By | 2024-07-08T23:03:17+05:30 July 5th, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update|

eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated campaign in which threat actors exploit [...]

5 07, 2024

Hackers Exploit Twilio API to Verify MFA Phone Numbers

By | 2024-07-05T23:01:31+05:30 July 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

A vulnerability in an unauthenticated endpoint allowed threat actors to identify phone numbers associated with [...]

Subscribe to our newsletter to receive security tips everday!