Exploitation

Home/Exploitation
15 03, 2024

Hackers weaponize LNK files to deploy AutoIt malware

By | 2024-03-19T03:12:14+05:30 March 15th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity [...]

14 03, 2024

Hackers deploy TMChecker RAT to target popular VPN and mail servers

By | 2024-03-21T21:37:18+05:30 March 14th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

A new tool discovered on the Dark Web indicates a change in cybercriminal tactics for [...]

13 03, 2024

PixPirate, an Android banking malware

By | 2024-03-19T03:10:27+05:30 March 13th, 2024|Android banking trojan, Android malware, BOTNET, Compromised, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers [...]

13 03, 2024

Adobe Reader Infostealer Spreads Through Email in Brazil

By | 2024-03-15T07:57:55+05:30 March 13th, 2024|BOTNET, Compromised, Exploitation, infostealer, Internet Security, Malware, Security Advisory, Security Update|

A recent email spam campaign is distributing infostealer malware disguised as an Adobe Reader Installer. [...]

12 03, 2024

BianLian Exploits TeamCity Vulnerability to Install Backdoors

By | 2024-03-26T06:23:17+05:30 March 12th, 2024|Backdoor, Exploitation, Malware, Security Advisory, Security Update, vulnerability|

The cybercriminal group BianLian, recognized for their ransomware assaults, has garnered attention from the information [...]

Subscribe to our newsletter to receive security tips everday!