Exploitation

Home/Exploitation
18 01, 2025

Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

By | 2025-01-18T04:08:33+05:30 January 18th, 2025|BOTNET, Exploitation, Internet Security, Linux Malware, Malware, Security Advisory, Security Update, Tips|

A highly sophisticated Linux rootkit, Pumakit, has been identified targeting critical infrastructure sectors like telecommunications, [...]

18 01, 2025

AWS Addresses Security Flaws in WorkSpaces, AppStream 2.0, and DCV

By | 2025-01-18T03:32:58+05:30 January 18th, 2025|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

AWS has issued a critical security advisory for vulnerabilities in certain versions of its clients [...]

18 01, 2025

‘Sneaky 2FA’ Phishing Kit Bypasses Microsoft 365 Authentication

By | 2025-01-18T03:53:32+05:30 January 18th, 2025|BOTNET, Exploitation, Internet Security, malicious cyber actors, phishing, Security Advisory, Security Update|

Researchers have discovered "Sneaky 2FA," a phishing kit targeting Microsoft 365 accounts to steal credentials [...]

16 01, 2025

Exploit Enables NTLMv1 Despite Active Directory Limits

By | 2025-01-18T03:21:40+05:30 January 16th, 2025|Exploitation, Internet Security, Security Advisory, Security Update, Tips|

Researchers discovered a misconfiguration in on-premise applications that bypasses Active Directory Group Policy meant to [...]

15 01, 2025

Hackers Exploit YouTube Links and Microsoft 365 Themes to Steal Logins

By | 2025-01-16T23:09:48+05:30 January 15th, 2025|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, phishing, Security Advisory, Security Update|

Cybercriminals are running advanced phishing attacks on Microsoft 365 users using fake URLs that closely [...]

Subscribe to our newsletter to receive security tips everday!