Exploitation

Home/Exploitation
22 04, 2024

Watch Out for Weaponized Zip Files Distributing WINELOADER Malware

By | 2024-04-25T22:20:34+05:30 April 22nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

Russian threat group APT29 targeted German political parties with a new backdoor, WINELOADER, via spear-phishing [...]

17 04, 2024

Surge in Zero-click Vulnerabilities: The Rise of ‘Mobile NotPetya’

By | 2024-04-19T06:28:51+05:30 April 17th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

The cybersecurity community warns of the rising threat of a "mobile NotPetya" event, a self-propagating [...]

17 04, 2024

Hackers Customize LockBit 3.0 Ransomware for Global Organization Attacks

By | 2024-04-17T09:04:11+05:30 April 17th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update|

Hackers exploit LockBit 3.0 ransomware for its advanced encryption, successfully locking victims' files for ransom. [...]

15 04, 2024

Critical PAN-OS Command Injection Vulnerability Exploited

By | 2024-04-16T22:30:10+05:30 April 15th, 2024|Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

Palo Alto Networks alerts customers to a critical command injection vulnerability in PAN-OS GlobalProtect feature, [...]

5 04, 2024

New E-Shopping Attack: Hijacking Users’ Banking Credentials

By | 2024-04-10T09:15:49+05:30 April 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed [...]

Subscribe to our newsletter to receive security tips everday!