Exploitation

Home/Exploitation
15 05, 2024

New Google Chrome Zero-day Being Exploited in the Wild—Patch Immediately!

By | 2024-05-17T06:28:20+05:30 May 15th, 2024|Exploitation, google, Internet Security, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Google has released a critical security update for its Chrome browser upon uncovering a zero-day [...]

15 05, 2024

Hackers Utilize Word Files to Distribute DanaBot Malware

By | 2024-05-21T20:45:38+05:30 May 15th, 2024|BOTNET, Compromised, Exploitation, Malware, Security Advisory, Security Update, Tips|

Recent email campaigns distribute DanaBot malware through two document types: those exploiting equation editor and [...]

14 05, 2024

Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability

By | 2024-05-14T23:12:27+05:30 May 14th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely [...]

13 05, 2024

Microsoft Edge Zero-Day Exploit Detected in Live Attacks

By | 2024-05-13T22:13:11+05:30 May 13th, 2024|Exploitation, Internet Security, Microsoft, Security Advisory, Security Update, vulnerability, Zero Day Attack|

A zero-day vulnerability in Microsoft Edge, identified as CVE-2024-4671, has been actively exploited by malicious [...]

10 05, 2024

New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control

By | 2024-05-10T21:39:09+05:30 May 10th, 2024|Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

Two critical vulnerabilities in F5 Next-Gen Big IP have been uncovered, enabling threat actors to [...]

Subscribe to our newsletter to receive security tips everday!