Exploitation

Home/Exploitation
2 08, 2024

Hackers Exploit WordPress Plugin File Upload Flaw

By | 2024-08-05T06:03:06+05:30 August 2nd, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Hackers are exploiting a critical vulnerability (CVE-2024-6220) in the WordPress plugin 简数采集器 (Keydatas) that allows [...]

2 08, 2024

Microsoft Patches Critical Edge Flaw Enabling Code Execution

By | 2024-08-02T22:47:09+05:30 August 2nd, 2024|BOTNET, Exploitation, Internet Security, Microsoft, Security Advisory, Security Update, vulnerability|

Microsoft has patched critical vulnerabilities in Edge. Users should update to the latest version to [...]

1 08, 2024

Hackers Exploiting GeoServer RCE Flaw, 6,635 Servers at Risk

By | 2024-08-02T22:35:03+05:30 August 1st, 2024|Exploitation, Internet Security, RCE Flaw, Security Advisory, Security Update, Tips, vulnerability|

A critical flaw in GeoServer, an open-source Java software, exposes thousands of servers to risk. [...]

1 08, 2024

Phishing Campaign Exploited Proofpoint for Email Spoofing

By | 2024-08-02T22:38:22+05:30 August 1st, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, phishing, Security Advisory, Security Update|

Guardio Labs recently identified "EchoSpoofing," a critical vulnerability in Proofpoint's email protection service used by [...]

31 07, 2024

New Specula Tool Turns Outlook into a C2 Server via Registry Exploit

By | 2024-08-02T22:39:45+05:30 July 31st, 2024|Exploitation, Internet Security, Security Advisory, Security Update, Tips|

Cybersecurity firm TrustedSec has introduced a new tool named Specula, which leverages a longstanding vulnerability [...]

Subscribe to our newsletter to receive security tips everday!