Exploitation

Home/Exploitation
26 06, 2024

Critical Vulnerability in MOVEit Transfer Allowed Hackers to Access Files

By | 2024-07-01T21:49:22+05:30 June 26th, 2024|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

A critical vulnerability, CVE-2024-5806, in MOVEit Transfer software poses severe risks to organizations relying on [...]

25 06, 2024

Linux LPE Zero-Day Exploit via GRUB Bootloader

By | 2024-07-09T23:15:54+05:30 June 25th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability, Zero Day Attack|

A new threat actor has surfaced, claiming a zero-day vulnerability in the Linux GRUB bootloader [...]

24 06, 2024

SneakyChef and SugarGhost, newly identified RAT malware strains

By | 2024-07-09T23:28:57+05:30 June 24th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update, windows|

Talos Intelligence has uncovered a sophisticated cyber campaign orchestrated by the threat actor SneakyChef. This [...]

21 06, 2024

New Linux Variant of RansomHub Targets ESXi Systems

By | 2024-07-01T22:11:04+05:30 June 21st, 2024|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update|

Hackers frequently target ESXi systems due to their extensive use in managing enterprise virtualized infrastructure, [...]

21 06, 2024

New Security Flaw Enables Access to Microsoft Corporate Email Accounts

By | 2024-06-25T05:38:36+05:30 June 21st, 2024|Compromised, Exploitation, Microsoft, Security Advisory, Security Update|

A new security flaw allows attackers to impersonate Microsoft corporate email accounts, increasing phishing risks. [...]

Subscribe to our newsletter to receive security tips everday!