Exploitation

Home/Exploitation
27 02, 2024

Xeno RAT Exploits Windows DLL Search to Evade Detection

By | 2024-02-28T09:46:03+05:30 February 27th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Tips, windows|

A newly identified, sophisticated malware coded in C# has emerged. Dubbed Xeno RAT, this malware [...]

26 02, 2024

Compromised PyPI Package Deploys NovaSentinel Stealer on Windows

By | 2024-02-26T08:37:08+05:30 February 26th, 2024|Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Tips, windows|

Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, [...]

26 02, 2024

LockBit Returns, Unveiling Fresh Claims and Victims

By | 2024-02-28T09:41:46+05:30 February 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update, Tips|

The narrative surrounding the takedown of the LockBit ransomware on February 19 is still evolving. [...]

23 02, 2024

Analysts Expose Apple’s Latest Zero-Click Shortcuts Vulnerability

By | 2024-02-26T08:37:44+05:30 February 23rd, 2024|apple, BOTNET, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

Information has surfaced regarding a recently patched high-severity security vulnerability in Apple's Shortcuts app, allowing [...]

22 02, 2024

Multiple Cross-Site Scripting (XSS) Flaws in Joomla Could Result in Remote Code Execution

By | 2024-02-26T08:43:12+05:30 February 22nd, 2024|Exploitation, Internet Security, Mobile Security, Remote code execution, Security Advisory, Security Update, vulnerability|

Five vulnerabilities have been discovered within the Joomla content management system that could be exploited [...]

Subscribe to our newsletter to receive security tips everday!