Exploitation

Home/Exploitation
15 04, 2024

Critical PAN-OS Command Injection Vulnerability Exploited

By | 2024-04-16T22:30:10+05:30 April 15th, 2024|Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

Palo Alto Networks alerts customers to a critical command injection vulnerability in PAN-OS GlobalProtect feature, [...]

5 04, 2024

New E-Shopping Attack: Hijacking Users’ Banking Credentials

By | 2024-04-10T09:15:49+05:30 April 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed [...]

3 04, 2024

StrelaStealer targets users to steal logins from Outlook and Thunderbird

By | 2024-04-19T06:29:13+05:30 April 3rd, 2024|BOTNET, Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

A sophisticated variant of StrelaStealer malware, tailored for Spanish-speaking users, is targeting popular email clients [...]

28 03, 2024

Hackers deploy weaponized PDF files to distribute Mispadu banking malware

By | 2024-04-01T08:07:02+05:30 March 28th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Originally focused on Latin America, the banking trojan Mispadu has broadened its scope to Europe, [...]

27 03, 2024

Watch out for free Android VPN apps that transform your device into proxies

By | 2024-03-28T05:22:52+05:30 March 27th, 2024|Android malware, BOTNET, Compromised, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, Tips|

Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices [...]

Subscribe to our newsletter to receive security tips everday!