Exploitation

Home/Exploitation
1 09, 2022

Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability

By | 2022-09-06T15:00:52+05:30 September 1st, 2022|Apple, Exploitation, IOC's, malicious cyber actors, Security Update|

Apple has released a new iOS 12 build for customers using the older models of [...]

12 08, 2022

Palo Alto Networks: New PAN-OS DDoS flaw exploited in attacks

By | 2022-08-12T22:51:28+05:30 August 12th, 2022|Exploitation, malicious cyber actors, Malicious extension, Security Advisory, Security Update, vulnerability|

Threat actors are exploiting a vulnerability, tracked as CVE-2022-0028 a high severity issue in Palo Alto Networks [...]

8 08, 2022

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

By | 2022-08-08T13:26:02+05:30 August 8th, 2022|Exploitation, IOC's, Linux Malware, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Targeted Attacks|

A new IoT botnet malware dubbed RapperBot has been noticed promptly evolving its capabilities because [...]

8 07, 2022

Hive Ransomware Upgraded to Rust to Deliver More Sophisticated Encryption

By | 2022-07-08T14:37:22+05:30 July 8th, 2022|Compromised, Exploitation, Microsoft, Ransomware, Security Advisory, Security Update|

Researchers from Microsoft Security have spotted an upgraded version of the ransomware-as-a-service (RaaS) dubbed Hive. [...]

4 07, 2022

Jenkins discloses dozens of zero-day bugs in multiple plugins

By | 2022-07-04T14:43:44+05:30 July 4th, 2022|Exploitation, Security Advisory, Security Update, vulnerability, Zero Day Attack|

The Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open-source [...]

Subscribe to our newsletter to receive security tips everday!