Evilproxy

Home/Evilproxy
7 06, 2023

Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors

By | 2023-06-08T07:49:56+05:30 June 7th, 2023|BOTNET, Compromised, Data Breach, Evilproxy, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

TrueBot downloader trojan botnet activity has increased significantly in the past month, researchers say. What [...]

2 06, 2023

Attackers Exploit Critical Zero-Day Vulnerability in MOVEit Transfer

By | 2023-06-07T04:39:30+05:30 June 2nd, 2023|BOTNET, Compromised, Evilproxy, Internet Security, Mobile Security, Security Advisory, Security Update, Tips|

A critical vulnerability in Progress Software's MoveIt Transfer is under exploitation, according to a report [...]

31 05, 2023

Android trojan “DogeRAT” targets Indian users, stealing personal and financial information

By | 2023-06-01T05:41:55+05:30 May 31st, 2023|BOTNET, Compromised, Evilproxy, Internet Security, Mobile Security, Security Advisory, Security Update, Tips|

An open-source Android virus known as DogeRAT (Remote Access Trojan) has been discovered by CloudSEK, an AI cybersecurity company.  [...]

29 05, 2023

Zyxel firewalls are affected by two security flaws

By | 2023-05-29T21:45:51+05:30 May 29th, 2023|BOTNET, Compromised, cyberattack, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Software Issues, Targeted Attacks, Tips, Zero Day Attack|

Zyxell has released a security advisory for multiple buffer overflow vulnerabilities. Exploitation of these vulnerabilities could allow [...]

25 05, 2023

GUI-vil’s Strategies in AWS Compromises

By | 2023-05-29T07:31:03+05:30 May 25th, 2023|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Researchers have been tracking a financially motivated threat group known as GUI-vil (aka p0-LUCR-1), based in [...]

Subscribe to our newsletter to receive security tips everday!