Exploitation

Home/Exploitation
23 05, 2024

Hackers Can Exploit Apple’s Wi-Fi Positioning System to Track Users Globally

By | 2024-05-30T06:49:25+05:30 May 23rd, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update|

A recent study by University of Maryland security researchers revealed a major privacy vulnerability in [...]

22 05, 2024

GHOSTENGINE Malware Exploits Drivers to Terminate EDR Agents

By | 2024-05-22T21:42:36+05:30 May 22nd, 2024|Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

Researchers discovered REF4578, an intrusion set that exploits vulnerable drivers to disable EDRs for crypto [...]

21 05, 2024

Zabbix SQL Injection Vulnerability Leads to Remote Code Execution

By | 2024-05-21T20:36:54+05:30 May 21st, 2024|BOTNET, Compromised, Exploitation, Remote code execution, vulnerability|

Zabbix, a widely used network monitoring tool in corporate IT infrastructure globally, is susceptible to [...]

17 05, 2024

Recent Linux Backdoor Targets Linux Users

By | 2024-05-17T22:08:05+05:30 May 17th, 2024|BOTNET, Compromised, Exploitation, Linux Malware, malicious cyber actors, Malware, Security Advisory, Security Update|

Recently, cybersecurity researchers at Symantec uncovered a fresh Linux backdoor actively targeting users through installation [...]

Subscribe to our newsletter to receive security tips everday!