Compromised

Home/Compromised
7 08, 2023

Critical Microsoft Power Platform Vulnerability: Proactive Security Methods to Prevent Exploitation

By | 2023-08-10T07:12:36+05:30 August 7th, 2023|Compromised, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Microsoft, Mobile Security, Security Advisory, Security Update|

Microsoft addressed a critical vulnerability in its Power Platform after criticism for a delayed response. [...]

7 08, 2023

Fake VMware vConnector package detected in PyPI

By | 2023-08-14T06:54:51+05:30 August 7th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

IT professionals were targeted by a malicious package named "VMConnect," which impersonated the VMware vSphere [...]

4 08, 2023

Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners.

By | 2023-08-14T07:00:36+05:30 August 4th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

Threat actors use versioning to bypass Google Play Store's malware detection and target Android users. [...]

3 08, 2023

NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets

By | 2023-08-07T06:00:14+05:30 August 3rd, 2023|Compromised, Evilproxy, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Tips|

Palo Alto Networks Unit 42 found a new phishing campaign distributing a Python variant of [...]

1 08, 2023

Fruity Trojan: Uses deceptive software installers to spread the Remcos RAT

By | 2023-08-03T09:50:56+05:30 August 1st, 2023|Backdoor, BOTNET, Compromised, Data Breach, Exploitation, infostealer, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

Cybercriminals are fabricating counterfeit websites containing software installers that have been infected with a downloader [...]

Subscribe to our newsletter to receive security tips everday!