Exploitation

Home/Exploitation
26 04, 2024

Hackers exploit Autodesk Drive to host weaponized PDF files

By | 2024-04-26T20:29:16+05:30 April 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Autodesk Drive serves as a cloud-based data-sharing platform for organizations, facilitating document and file sharing. [...]

25 04, 2024

GuptiMiner Exploits eScan to Distribute Miners and Backdoors

By | 2024-04-29T06:38:19+05:30 April 25th, 2024|BOTNET, Compromised, Exploitation, IOC's, malicious cyber actors|

Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system [...]

23 04, 2024

Critical Oracle VirtualBox vulnerability now has a PoC exploit released

By | 2024-04-25T22:19:45+05:30 April 23rd, 2024|Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Oracle VirtualBox had a critical vulnerability (CVE-2024-21111) allowing Privilege Escalation and Arbitrary File Move/Delete, rated [...]

Subscribe to our newsletter to receive security tips everday!