Exploitation

Home/Exploitation
10 01, 2025

Juniper Networks Flaw Allowed Remote Network Attacks

By | 2025-01-21T10:52:51+05:30 January 10th, 2025|BOTNET, Exploitation, Internet Security, Regulation, Security Advisory, Security Update, Tips, vulnerability|

Juniper Networks disclosed CVE-2025-21598, a critical vulnerability in Junos OS and Junos OS Evolved, allowing [...]

10 01, 2025

LDAP Exploit Delivers Info-Stealing Malware

By | 2025-01-18T03:17:47+05:30 January 10th, 2025|BOTNET, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Cybercriminals are exploiting critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept (PoC) exploits [...]

7 01, 2025

WordPress Plugin Exploits Websites to Steal Customer Payment Information

By | 2025-01-13T22:55:40+05:30 January 7th, 2025|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

Cybercriminals created PhishWP, a malicious WordPress plugin, to mimic payment gateways like Stripe for phishing [...]

6 01, 2025

WordPress Plugin Flaw Puts 3 Million Sites at Risk of Injection Attacks

By | 2025-01-07T23:16:45+05:30 January 6th, 2025|BOTNET, Exploitation, Internet Security, Malware, Security Advisory, Security Update, vulnerability, wordpress|

A critical vulnerability has been found in the UpdraftPlus: WP Backup & Migration Plugin, affecting [...]

6 01, 2025

Critical OpenSSH Vulnerability (CVE-2024-6387) Exploit Released

By | 2025-01-18T04:17:09+05:30 January 6th, 2025|Exploitation, Internet Security, Remote code execution, Security Advisory, Security Update, vulnerability|

A PoC exploit for the critical OpenSSH vulnerability CVE-2024-6387 has been released, enabling remote attackers [...]

Subscribe to our newsletter to receive security tips everday!