Exploitation

Home/Exploitation
13 05, 2024

Microsoft Edge Zero-Day Exploit Detected in Live Attacks

By | 2024-05-13T22:13:11+05:30 May 13th, 2024|Exploitation, Internet Security, Microsoft, Security Advisory, Security Update, vulnerability, Zero Day Attack|

A zero-day vulnerability in Microsoft Edge, identified as CVE-2024-4671, has been actively exploited by malicious [...]

10 05, 2024

New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control

By | 2024-05-10T21:39:09+05:30 May 10th, 2024|Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

Two critical vulnerabilities in F5 Next-Gen Big IP have been uncovered, enabling threat actors to [...]

10 05, 2024

Dell Breached: Attackers Acquire Personal Information of 49 Million Customers

By | 2024-05-13T19:31:19+05:30 May 10th, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Dell Technologies recently disclosed a data breach involving a company portal containing limited customer information [...]

9 05, 2024

CrushFTP vulnerability exploited in the wild to execute remote code

By | 2024-05-09T08:03:47+05:30 May 9th, 2024|BOTNET, Exploitation, Internet Security, Remote code execution, Security Advisory, Security Update, vulnerability|

A critical vulnerability, CVE-2024-4040, has been actively exploited in the wild in CrushFTP. This flaw [...]

8 05, 2024

MorLock Ransomware Targets Organizations, Stealing Business Data

By | 2024-05-09T08:04:13+05:30 May 8th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update|

The MorLock ransomware group has escalated its assaults on Russian businesses, resulting in disruptions and [...]

Subscribe to our newsletter to receive security tips everday!