Exploitation

Home/Exploitation
17 05, 2024

Apple Safari Zero-Day Flaw Exploited at Pwn2Own: Urgent Patch Required

By | 2024-05-28T21:46:41+05:30 May 17th, 2024|Apple, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips, Zero Day Attack|

Apple has rolled out security updates to tackle a zero-day vulnerability in its Safari web [...]

16 05, 2024

Millions of IoT Devices Vulnerable to Attacks, Posing Risk of Full Takeover

By | 2024-05-17T06:27:53+05:30 May 16th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Researchers have uncovered four significant vulnerabilities in the ThroughTek Kalay Platform, utilized by 100 million [...]

15 05, 2024

New Google Chrome Zero-day Being Exploited in the Wild—Patch Immediately!

By | 2024-05-17T06:28:20+05:30 May 15th, 2024|Exploitation, google, Internet Security, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Google has released a critical security update for its Chrome browser upon uncovering a zero-day [...]

15 05, 2024

Hackers Utilize Word Files to Distribute DanaBot Malware

By | 2024-05-21T20:45:38+05:30 May 15th, 2024|BOTNET, Compromised, Exploitation, Malware, Security Advisory, Security Update, Tips|

Recent email campaigns distribute DanaBot malware through two document types: those exploiting equation editor and [...]

14 05, 2024

Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability

By | 2024-05-14T23:12:27+05:30 May 14th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely [...]

Subscribe to our newsletter to receive security tips everday!