Exploitation

Home/Exploitation
22 05, 2024

GHOSTENGINE Malware Exploits Drivers to Terminate EDR Agents

By | 2024-05-22T21:42:36+05:30 May 22nd, 2024|Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

Researchers discovered REF4578, an intrusion set that exploits vulnerable drivers to disable EDRs for crypto [...]

21 05, 2024

Zabbix SQL Injection Vulnerability Leads to Remote Code Execution

By | 2024-05-21T20:36:54+05:30 May 21st, 2024|BOTNET, Compromised, Exploitation, Remote code execution, vulnerability|

Zabbix, a widely used network monitoring tool in corporate IT infrastructure globally, is susceptible to [...]

17 05, 2024

Recent Linux Backdoor Targets Linux Users

By | 2024-05-17T22:08:05+05:30 May 17th, 2024|BOTNET, Compromised, Exploitation, Linux Malware, malicious cyber actors, Malware, Security Advisory, Security Update|

Recently, cybersecurity researchers at Symantec uncovered a fresh Linux backdoor actively targeting users through installation [...]

17 05, 2024

Apple Safari Zero-Day Flaw Exploited at Pwn2Own: Urgent Patch Required

By | 2024-05-28T21:46:41+05:30 May 17th, 2024|Apple, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips, Zero Day Attack|

Apple has rolled out security updates to tackle a zero-day vulnerability in its Safari web [...]

16 05, 2024

Millions of IoT Devices Vulnerable to Attacks, Posing Risk of Full Takeover

By | 2024-05-17T06:27:53+05:30 May 16th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Researchers have uncovered four significant vulnerabilities in the ThroughTek Kalay Platform, utilized by 100 million [...]

Subscribe to our newsletter to receive security tips everday!