Exploitation

Home/Exploitation
4 12, 2024

ElizaRAT Uses Google, Telegram, & Slack for C2 Communications

By | 2025-01-21T10:47:57+05:30 December 4th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

APT36, a Pakistani cyber-espionage group, now uses ElizaRAT, a Windows RAT with advanced evasion and [...]

4 12, 2024

Hackers Exploit Windows Event Logs for Manipulation and Data Theft

By | 2024-12-11T07:17:17+05:30 December 4th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, Tips|

Hackers exploit wevtutil.exe for LOLBAS attacks, enabling command execution, payload downloads, and persistence while bypassing [...]

2 12, 2024

HPE IceWall Flaw Enabled Unauthorized Data Changes

By | 2024-12-04T07:13:18+05:30 December 2nd, 2024|Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

HPE has released a security alert about a critical flaw in its IceWall product, CVE-2024-11856, [...]

28 11, 2024

Matrix Orchestrates Global DDoS Attack Campaign

By | 2025-01-08T23:35:50+05:30 November 28th, 2024|BOTNET, Compromised, DDOS, Exploitation, Internet Security, Malware, Security Advisory, Security Update|

Cybersecurity researchers have uncovered a large-scale DDoS campaign attributed to a threat actor known as [...]

27 11, 2024

NVIDIA Vulnerability Enables Data Tampering and Privilege Escalation

By | 2024-11-28T23:43:58+05:30 November 27th, 2024|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

NVIDIA has issued a critical security update for a major vulnerability in its Unified Fabric [...]

Subscribe to our newsletter to receive security tips everday!