Exploitation

Home/Exploitation
26 04, 2024

SSLoad Malware Combined with Tools Hijacks Entire Network Domain

By | 2024-04-29T06:37:44+05:30 April 26th, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

The FROZEN#SHADOW attack campaign employs SSLoad malware alongside Cobalt Strike Implants to seize control of [...]

26 04, 2024

Cactus Ransomware Exploits Vulnerability in Qlik Servers

By | 2024-04-29T06:38:01+05:30 April 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update, vulnerability|

Since November 2023, the Cactus ransomware gang has been exploiting vulnerable Qlik Sense servers, leveraging [...]

26 04, 2024

Hackers exploit Autodesk Drive to host weaponized PDF files

By | 2024-04-26T20:29:16+05:30 April 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Autodesk Drive serves as a cloud-based data-sharing platform for organizations, facilitating document and file sharing. [...]

25 04, 2024

GuptiMiner Exploits eScan to Distribute Miners and Backdoors

By | 2024-04-29T06:38:19+05:30 April 25th, 2024|BOTNET, Compromised, Exploitation, IOC's, malicious cyber actors|

Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system [...]

Subscribe to our newsletter to receive security tips everday!