Exploitation

Home/Exploitation
24 06, 2024

SneakyChef and SugarGhost, newly identified RAT malware strains

By | 2024-07-09T23:28:57+05:30 June 24th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update, windows|

Talos Intelligence has uncovered a sophisticated cyber campaign orchestrated by the threat actor SneakyChef. This [...]

21 06, 2024

New Linux Variant of RansomHub Targets ESXi Systems

By | 2024-07-01T22:11:04+05:30 June 21st, 2024|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update|

Hackers frequently target ESXi systems due to their extensive use in managing enterprise virtualized infrastructure, [...]

21 06, 2024

New Security Flaw Enables Access to Microsoft Corporate Email Accounts

By | 2024-06-25T05:38:36+05:30 June 21st, 2024|Compromised, Exploitation, Microsoft, Security Advisory, Security Update|

A new security flaw allows attackers to impersonate Microsoft corporate email accounts, increasing phishing risks. [...]

20 06, 2024

Hackers Use Progressive Web Apps to Steal Passwords

By | 2024-07-09T23:12:55+05:30 June 20th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, phishing, Security Advisory, Security Update|

Hackers are increasingly exploiting Progressive Web Apps (PWAs) for sophisticated phishing attacks to steal user [...]

17 06, 2024

Lumma Stealer Spreads Through Fake Browser Updates Using ClearFake

By | 2024-06-18T06:26:49+05:30 June 17th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

Recent research uncovered websites deploying Lumma Stealer disguised as browser updates. These sites, posing as [...]

Subscribe to our newsletter to receive security tips everday!