Exploitation

Home/Exploitation
9 12, 2022

Researchers Uncover Darknet Service Allowing Hackers to Trojonize Legit Android Apps

By | 2022-12-09T01:58:41+05:30 December 9th, 2022|BOTNET, Compromised, Darknet, Exploitation, hackers, infostealer, Internet Security, IOC's, Malware, Mobile Security, Security Advisory, Security Update|

Researchers have shed mild on a new hybrid malware campaign targeting the two Android and [...]

7 12, 2022

Lazarus group uses fake cryptocurrency apps to plant AppleJeus malware

By | 2022-12-07T10:43:43+05:30 December 7th, 2022|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, IOC's, malicious cyber actors, Security Advisory, Security Update|

Lazarus hacking group spreads malware using a fake cryptocurrency app called BloxHolder. This made-up brand [...]

7 12, 2022

New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network

By | 2022-12-09T23:21:37+05:30 December 7th, 2022|BOTNET, Compromised, DDOS, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Security Advisory, Security Update|

 Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security [...]

5 12, 2022

Critical Ping bug potentially allows remote hack of FreeBSD systems

By | 2022-12-09T23:20:40+05:30 December 5th, 2022|BOTNET, Compromised, Data Breach, Evilproxy, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take [...]

5 12, 2022

GoTo’s Cloud Storage and Dev Environment Breached by Hackers

By | 2022-12-07T10:23:08+05:30 December 5th, 2022|BOTNET, Compromised, Data Breach, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Tips|

GoTo, maker of the popular virtual meeting and desktop-sharing software, and its affiliate LastPass confirmed [...]

Subscribe to our newsletter to receive security tips everday!