Exploitation

Home/Exploitation
28 11, 2022

Amazon addresses vulnerability affecting AWS AppSync

By | 2022-11-28T22:21:12+05:30 November 28th, 2022|AWS, Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Security Advisory, Security Update, vulnerability|

Researchers from security company Datadog discovered a cross-tenant vulnerability in a popular Amazon Web Services (AWS) tool, [...]

28 11, 2022

Patch now! Google Chrome’s GPU code has a zero-day

By | 2022-11-28T21:16:19+05:30 November 28th, 2022|Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, vulnerability|

Google has released an important update to Chrome web browser that fixes another zero-day vulnerability.  [...]

24 11, 2022

Researchers Warn of Cyber Criminals Using Go-based Aurora Stealer Malware

By | 2022-11-24T00:06:14+05:30 November 24th, 2022|BOTNET, Compromised, Data Breach, Exploitation, hackers, infostealer, Internet Security, IOC's, Malware|

Researchers at SEKOIA identified 7 traffers teams on Dark Web forums that announced the availability [...]

23 11, 2022

Ducktail Malware Operation Evolves with New Malicious Capabilities

By | 2022-11-28T09:33:09+05:30 November 23rd, 2022|BOTNET, Compromised, Exploitation, hackers, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Targeted Attacks, Tips|

A Vietnam-based hacking operation dubbed "Ducktail" is targeting individuals and companies operating on Facebook's Ads [...]

22 11, 2022

Google Chrome extension used to steal cryptocurrency, passwords

By | 2022-11-22T12:38:42+05:30 November 22nd, 2022|BOTNET, Exploitation, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

A Google Chrome extension named "VenomSoftX" is being used to steal cryptocurrency from wallets and breach passwords. The [...]

Subscribe to our newsletter to receive security tips everday!