Exploitation

Home/Exploitation
2 10, 2024

Hackers targeting Docker Swarm, Kubernetes, and SSH servers in large-scale attacks

By | 2024-10-03T20:05:21+05:30 October 2nd, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Hackers are exploiting Docker Swarm, Kubernetes, and SSH servers, targeting Docker API vulnerabilities as the [...]

1 10, 2024

Linux CUPS has multiple vulnerabilities that allow remote code execution

By | 2024-10-04T21:41:17+05:30 October 1st, 2024|BOTNET, Exploitation, Internet Security, Linux Malware, Malware, RCE Flaw, Remote code execution, Security Advisory, Security Update, vulnerability|

Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers [...]

1 10, 2024

GorillaBot reigns as DDoS king with 300,000+ commands

By | 2024-10-02T02:36:06+05:30 October 1st, 2024|BOTNET, Compromised, DDOS, Exploitation, Internet Security, Malware, Security Advisory, Security Update|

The newly emerged Gorilla Botnet has launched over 300,000 DDoS attacks across 100+ countries from [...]

30 09, 2024

North Korean Hackers Tried to Steal Military Data

By | 2024-10-09T23:03:38+05:30 September 30th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, phishing, Security Advisory, Security Update|

Diehl Defence anti-aircraft missiles are successfully intercepting Russian attacks on Kyiv, with a 100% hit [...]

26 09, 2024

TeamViewer Privilege Escalation Vulnerability

By | 2024-09-27T22:18:03+05:30 September 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Security Advisory, Security Update, vulnerability|

A critical vulnerability in TeamViewer’s Windows Remote client, CVE-2024-7479 and CVE-2024-7481, allows attackers to elevate [...]

Subscribe to our newsletter to receive security tips everday!