Exploitation

Home/Exploitation
20 05, 2025

AutoIT Scripts Exploited to Deploy Windows Malware

By | 2025-05-26T21:24:35+05:30 May 20th, 2025|Exploitation, Internet Security, Malware, Security Advisory, Security Update, windows|

Cybersecurity researchers have discovered a sophisticated malware campaign that leverages AutoIT, a scripting language known [...]

13 05, 2025

VMware Tools Vulnerability: File Modification & Malicious Ops

By | 2025-05-14T20:41:08+05:30 May 13th, 2025|Exploitation, Internet Security, Security Advisory, Security Update, Tips, VMware, vulnerability|

A new macOS vulnerability, CVE-2025-31258, has been disclosed by security researcher wh1te4ever, along with a [...]

9 05, 2025

Cybercriminals Exploit IT Help Desks as Entry Point for Attacks

By | 2025-05-22T22:02:12+05:30 May 9th, 2025|Exploitation, Internet Security, Security Advisory, Security Update|

Cybercriminals are increasingly pretending to be IT staff or trusted authorities to trick employees into [...]

5 05, 2025

Pahalgam Attack Lure Used in Cyberattacks Against Indian Government

By | 2025-05-06T06:56:47+05:30 May 5th, 2025|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, phishing, Security Advisory, Security Update|

In a targeted cyber espionage campaign, attackers are using fake documents referencing the recent Pahalgam [...]

Subscribe to our newsletter to receive security tips everday!