Exploitation

Home/Exploitation
5 07, 2024

ScreenConnect Remote Access Client Exploited by Hackers to Deploy AsyncRAT

By | 2024-07-08T23:03:17+05:30 July 5th, 2024|BOTNET, Compromised, Exploitation, Security Advisory, Security Update|

eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated campaign in which threat actors exploit [...]

5 07, 2024

Hackers Exploit Twilio API to Verify MFA Phone Numbers

By | 2024-07-05T23:01:31+05:30 July 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

A vulnerability in an unauthenticated endpoint allowed threat actors to identify phone numbers associated with [...]

4 07, 2024

FakeBat Malware Targets AnyDesk, Zoom, Teams & Chrome

By | 2024-07-10T22:56:33+05:30 July 4th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Hackers are targeting and weaponizing AnyDesk, Zoom, Teams, and Chrome due to their widespread use [...]

4 07, 2024

RegreSSHion OpenSSH Vulnerability Enables RCE

By | 2024-07-05T22:06:57+05:30 July 4th, 2024|BOTNET, Compromised, Exploitation, RCE Flaw, Security Advisory, Security Update, vulnerability|

A newly discovered OpenSSH vulnerability, dubbed regreSSHion, allows remote attackers to gain root privileges on [...]

3 07, 2024

CapraRAT Mimics Popular Apps to Attack Android Users

By | 2024-07-05T22:07:18+05:30 July 3rd, 2024|Android malware, BOTNET, Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

Transparent Tribe (aka APT36), active since 2016, uses social engineering to target Indian government and [...]

Subscribe to our newsletter to receive security tips everday!