Exploitation

Home/Exploitation
2 12, 2024

HPE IceWall Flaw Enabled Unauthorized Data Changes

By | 2024-12-04T07:13:18+05:30 December 2nd, 2024|Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

HPE has released a security alert about a critical flaw in its IceWall product, CVE-2024-11856, [...]

28 11, 2024

Matrix Orchestrates Global DDoS Attack Campaign

By | 2024-11-29T23:39:28+05:30 November 28th, 2024|BOTNET, Compromised, DDOS, Exploitation, Internet Security, Malware, Security Advisory, Security Update|

Cybersecurity researchers have uncovered a large-scale DDoS campaign attributed to a threat actor known as [...]

27 11, 2024

NVIDIA Vulnerability Enables Data Tampering and Privilege Escalation

By | 2024-11-28T23:43:58+05:30 November 27th, 2024|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

NVIDIA has issued a critical security update for a major vulnerability in its Unified Fabric [...]

27 11, 2024

Exploitation of ProjectSend Authentication Vulnerability Discovered in the Wild

By | 2024-11-28T23:50:33+05:30 November 27th, 2024|Compromised, Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

ProjectSend, an open-source file-sharing web app, is actively being exploited after CVE-2024-11680 was assigned on [...]

27 11, 2024

New Stealthy GodLoader Malware Targets Multiple Platforms

By | 2024-12-02T22:42:29+05:30 November 27th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update, Tips|

GodLoader malware, discovered by Check Point, stealthily infects Windows, macOS, Linux, Android, and iOS, using [...]

Subscribe to our newsletter to receive security tips everday!