Exploitation

Home/Exploitation
31 10, 2022

Actively exploited Windows MoTW zero-day gets unofficial patch

By | 2022-10-31T18:44:25+05:30 October 31st, 2022|Exploitation, Internet Security, IOC's, malicious cyber actors, Microsoft, Security Advisory, Security Update, windows|

A free unofficial patch is available for a Mark-of-the-web (MoTW) security vulnerability impacting Windows 10 [...]

28 10, 2022

Microsoft links Raspberry Robin worm to Clop ransomware attacks

By | 2022-10-28T06:50:53+05:30 October 28th, 2022|Compromised, Exploitation, IOC's, Malicious extension, Malware, Microsoft, Ransomware, Security Advisory, Security Update, vulnerability|

Microsoft has discovered recent activity that links the Raspberry Robin worm to human-operated ransomware attacks.  The experts [...]

27 10, 2022

22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution

By | 2022-10-27T03:37:13+05:30 October 27th, 2022|Arbitrary Code Execution, Exploitation, Malware, Security Advisory, Security Update, Tips, vulnerability|

The security expert Andreas Kellas detailed a high-severity vulnerability, tracked as CVE-2022-35737 (CVSS score: 7.5), [...]

17 10, 2022

Venus Ransomware targets publicly exposed Remote Desktop services

By | 2022-10-28T09:44:33+05:30 October 17th, 2022|Exploitation, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

The malicious actors behind the relatively new Venus ransomware are hacking publicly exposed Remote Desktop [...]

4 10, 2022

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

By | 2022-10-04T15:52:12+05:30 October 4th, 2022|Compromised, Data Breach, Exploitation, IOC's, Linux Malware, Malware, Security Advisory, Security Update|

The recently learned Linux-Based ransomware pressure acknowledged as Cheerscrypt has been attributed to a Chinese [...]

Subscribe to our newsletter to receive security tips everday!