Exploitation

Home/Exploitation
21 10, 2024

Hackers Impersonate ESET to Distribute Wiper Malware

By | 2024-10-22T22:48:09+05:30 October 21st, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Hackers posed as ESET to spread wiper malware via phishing emails starting October 8, 2024. [...]

21 10, 2024

Hackers use Bumblebee malware to infiltrate corporate networks

By | 2024-10-21T21:58:30+05:30 October 21st, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Bumblebee malware has reemerged, threatening corporate networks globally, following its first sighting since Europol’s May [...]

10 10, 2024

Mozilla warns of a Firefox zero-day vulnerability actively exploited in cyberattacks

By | 2024-10-14T04:21:58+05:30 October 10th, 2024|Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical use-after-free vulnerability in Firefox and Firefox Extended Support Release (ESR) is being actively [...]

9 10, 2024

CISA warns of active exploitation of Microsoft zero-day vulnerabilities

By | 2024-10-10T22:51:43+05:30 October 9th, 2024|Exploitation, Microsoft, Security Advisory, Security Update, vulnerability, Zero Day Attack|

CISA warns of two critical Microsoft zero-day vulnerabilities, CVE-2024-43572 and CVE-2024-43573, actively exploited in the [...]

8 10, 2024

Cacti vulnerability allows attackers to execute remote code

By | 2024-10-14T04:22:39+05:30 October 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow [...]

Subscribe to our newsletter to receive security tips everday!