Exploitation

Home/Exploitation
2 07, 2024

Malware Spreading via Binance Smart Contracts Blockchain

By | 2024-08-21T22:42:42+05:30 July 2nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their [...]

2 07, 2024

New GrimResource Attack Technique Exploits MMC and DLL Flaw

By | 2024-07-03T02:23:50+05:30 July 2nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

A new malicious code execution technique, GrimResource, targets Microsoft Management Console. Attackers exploit an old [...]

27 06, 2024

Xeno RAT is actively targeting users via GitHub repositories and .gg domains.

By | 2024-07-01T22:10:29+05:30 June 27th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

Threat actors leverage RATs for sustained access to compromised systems, facilitating prolonged espionage and exploitation. [...]

26 06, 2024

Critical Vulnerability in MOVEit Transfer Allowed Hackers to Access Files

By | 2024-07-01T21:49:22+05:30 June 26th, 2024|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical vulnerability, CVE-2024-5806, in MOVEit Transfer software poses severe risks to organizations relying on [...]

25 06, 2024

Linux LPE Zero-Day Exploit via GRUB Bootloader

By | 2024-07-09T23:15:54+05:30 June 25th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability, Zero Day Attack|

A new threat actor has surfaced, claiming a zero-day vulnerability in the Linux GRUB bootloader [...]

Subscribe to our newsletter to receive security tips everday!