Exploitation

Home/Exploitation
18 12, 2024

New VIPKeyLogger in Office Docs Steals Credentials

By | 2025-01-08T23:34:17+05:30 December 18th, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Security Advisory, Security Update|

VIPKeyLogger, similar to the Snake Keylogger, spreads through phishing campaigns via attachments disguised as archive [...]

18 12, 2024

Hackers Exploit Windows Management Console for Backdoor Payloads

By | 2024-12-18T06:47:35+05:30 December 18th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

The FLUX#CONSOLE campaign exploits .MSC files to deploy backdoor malware, highlighting advanced phishing and Windows [...]

16 12, 2024

Hackers Exploit Microsoft Teams for Remote System Access

By | 2024-12-18T00:05:39+05:30 December 16th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Microsoft, Security Advisory, Security Update|

Hackers used Microsoft Teams to trick victims into granting remote system access, showcasing advanced social [...]

12 12, 2024

Emoji Exploit Targets iOS Messenger Group Calls

By | 2024-12-17T00:10:26+05:30 December 12th, 2024|Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

A new vulnerability in Facebook Messenger for iOS could disrupt group calls by exploiting emoji [...]

11 12, 2024

Meeten Malware Targets macOS and Windows to Steal Logins

By | 2025-01-21T10:47:27+05:30 December 11th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Realst malware targets Web3 professionals using fake companies like "Meetio" with AI-generated content. Victims are [...]

Subscribe to our newsletter to receive security tips everday!