Exploitation

Home/Exploitation
10 10, 2024

Mozilla warns of a Firefox zero-day vulnerability actively exploited in cyberattacks

By | 2024-10-14T04:21:58+05:30 October 10th, 2024|Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical use-after-free vulnerability in Firefox and Firefox Extended Support Release (ESR) is being actively [...]

9 10, 2024

CISA warns of active exploitation of Microsoft zero-day vulnerabilities

By | 2024-10-28T23:13:34+05:30 October 9th, 2024|Exploitation, Microsoft, Security Advisory, Security Update, vulnerability, Zero Day Attack|

CISA warns of two critical Microsoft zero-day vulnerabilities, CVE-2024-43572 and CVE-2024-43573, actively exploited in the [...]

8 10, 2024

Cacti vulnerability allows attackers to execute remote code

By | 2024-10-14T04:22:39+05:30 October 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow [...]

2 10, 2024

Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks

By | 2024-11-28T23:53:59+05:30 October 2nd, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Hackers are exploiting Docker Swarm, Kubernetes, and SSH servers, targeting Docker API vulnerabilities as the [...]

1 10, 2024

Linux CUPS has multiple vulnerabilities that allow remote code execution

By | 2024-10-04T21:41:17+05:30 October 1st, 2024|BOTNET, Exploitation, Internet Security, Linux Malware, Malware, RCE Flaw, Remote code execution, Security Advisory, Security Update, vulnerability|

Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers [...]

Subscribe to our newsletter to receive security tips everday!