Exploitation

Home/Exploitation
13 01, 2023

RAT malware campaign tries to evade detection using polyglot files

By | 2023-01-13T22:29:21+05:30 January 13th, 2023|BOTNET, Data Breach, Evilproxy, Exploitation, IOC's, malicious cyber actors, Security Advisory, Security Update|

Operators of the StrRAT and Ratty distant entry trojans (RAT) are operating a brand new [...]

13 01, 2023

Cacti Patched CVE-2022-46169 Critical RCE Vulnerability

By | 2023-01-13T07:28:43+05:30 January 13th, 2023|Compromised, Evilproxy, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

Open-source, web-based network monitoring and graphing tool Cacti received an update recently to fix a critical-severity security vulnerability that [...]

10 01, 2023

Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App

By | 2023-01-23T23:00:53+05:30 January 10th, 2023|BOTNET, Data Breach, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema [...]

9 01, 2023

Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors

By | 2023-01-09T08:25:51+05:30 January 9th, 2023|Backdoor, Compromised, Darknet, Data Breach, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

Organisations that fell victim to Andromeda, a commodity malware that dates back 12 years, seem to [...]

6 01, 2023

Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub

By | 2023-01-06T23:50:34+05:30 January 6th, 2023|Compromised, Exploitation, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

South African threat actors known as 'Automated Libra' has been improving their techniques to make [...]

Subscribe to our newsletter to receive security tips everday!