Exploitation

Home/Exploitation
23 01, 2025

Helldown Ransomware Exploits Zyxel Zero-Day Vulnerability

By | 2025-02-05T09:18:22+05:30 January 23rd, 2025|Exploitation, Internet Security, Ransomware, Security Advisory, Security Update, vulnerability, Zero Day Attack|

A new ransomware, "Helldown," is exploiting vulnerabilities in Zyxel firewalls to breach corporate networks. Researchers [...]

22 01, 2025

Windows File Explorer Privilege Escalation (CVE-2024-38100) Exploited

By | 2025-01-23T02:14:03+05:30 January 22nd, 2025|Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability, windows|

A critical Windows File Explorer flaw, CVE-2024-38100, has been exploited, allowing attackers to gain admin-level [...]

21 01, 2025

FunkSec Ransomware Leads December Attacks, Compromising 85 Victims

By | 2025-01-23T00:33:38+05:30 January 21st, 2025|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update|

FunkSec, a RaaS operator, utilizes artificial intelligence to evolve threat actor strategies. While AI aids [...]

20 01, 2025

Azure DevOps flaws allow CRLF injection and DNS rebinding attacks

By | 2025-02-06T11:37:00+05:30 January 20th, 2025|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

Security researchers have uncovered multiple Azure DevOps vulnerabilities, enabling CRLF injection and DNS rebinding attacks. [...]

18 01, 2025

Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

By | 2025-01-21T10:51:25+05:30 January 18th, 2025|BOTNET, Exploitation, Internet Security, Linux Malware, Malware, Security Advisory, Security Update, Tips|

A highly sophisticated Linux rootkit, Pumakit, has been identified targeting critical infrastructure sectors like telecommunications, [...]

Subscribe to our newsletter to receive security tips everday!