Exploitation

Home/Exploitation
12 07, 2024

FishXProxy amplifies phishing attacks with cunning and deceptive tactics

By | 2024-07-12T21:42:52+05:30 July 12th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, phishing, Security Advisory, Security Update|

Imagine receiving an email that appears completely legitimate. This is the deceptive capability of the [...]

12 07, 2024

Hackers Using ClickFix Tactics to Deploy Malware

By | 2024-07-12T20:05:33+05:30 July 12th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

McAfee Labs researchers have identified a sophisticated malware delivery method, "ClickFix," using advanced social engineering [...]

11 07, 2024

Microsoft Patches 3 Critical Vulnerabilities in July Update

By | 2024-07-12T19:50:50+05:30 July 11th, 2024|BOTNET, Compromised, Exploitation, Microsoft, Security Advisory, Security Update|

Microsoft's July security update addresses 142 vulnerabilities, including one already being exploited. This update is [...]

10 07, 2024

Eldorado Ransomware Targets Windows and Linux Systems

By | 2024-07-10T23:52:59+05:30 July 10th, 2024|BOTNET, Compromised, Exploitation, Linux Malware, Malware, Ransomware, Security Advisory, Security Update, windows|

Ransomware-as-a-service (RaaS) has evolved into a sophisticated, enterprise-like model. From 2022 to 2023, ransomware ads [...]

9 07, 2024

Jenkins Script Console used for cryptocurrency mining attacks by hackers

By | 2024-07-12T20:09:42+05:30 July 9th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Security Advisory, Security Update|

Researchers discovered that attackers can exploit improperly configured Jenkins Script Console for criminal activities like [...]

Subscribe to our newsletter to receive security tips everday!