Exploitation

Home/Exploitation
23 04, 2024

Critical Oracle VirtualBox vulnerability now has a PoC exploit released

By | 2024-04-25T22:19:45+05:30 April 23rd, 2024|Compromised, Exploitation, Security Advisory, Security Update, vulnerability|

Oracle VirtualBox had a critical vulnerability (CVE-2024-21111) allowing Privilege Escalation and Arbitrary File Move/Delete, rated [...]

22 04, 2024

Watch Out for Weaponized Zip Files Distributing WINELOADER Malware

By | 2024-04-25T22:20:34+05:30 April 22nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

Russian threat group APT29 targeted German political parties with a new backdoor, WINELOADER, via spear-phishing [...]

17 04, 2024

Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’

By | 2024-04-19T06:28:51+05:30 April 17th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

The cybersecurity community warns of the rising threat of a "mobile NotPetya" event, a self-propagating [...]

17 04, 2024

Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks

By | 2024-04-17T09:04:11+05:30 April 17th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update|

Hackers exploit LockBit 3.0 ransomware for its advanced encryption, successfully locking victims' files for ransom. [...]

Subscribe to our newsletter to receive security tips everday!