Exploitation

Home/Exploitation
26 03, 2024

Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages

By | 2024-03-27T22:26:18+05:30 March 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Security Advisory, Security Update|

Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by [...]

26 03, 2024

Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own

By | 2024-03-26T05:46:59+05:30 March 26th, 2024|Compromised, Exploitation, Internet Security, malicious cyber actors, Security Advisory, Security Update, Zero Day Attack|

Mozilla has swiftly responded to two zero-day vulnerabilities exploited during the recent Pwn2Own Vancouver 2024 [...]

25 03, 2024

New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner

By | 2024-03-26T05:24:07+05:30 March 25th, 2024|BOTNET, Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying [...]

25 03, 2024

Over 170,000 GitHub accounts of Python developers hacked in supply chain attack.

By | 2024-03-26T05:47:17+05:30 March 25th, 2024|BOTNET, Compromised, cyberattack, Exploitation, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Over 170,000 users have been affected by a sophisticated attack targeting the Python software supply [...]

22 03, 2024

DHCP Exploited for Privilege Escalation in Windows Domains

By | 2024-03-26T05:47:40+05:30 March 22nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, windows|

Security researchers have discovered a sophisticated method, named "DHCP Coerce," that exploits the Dynamic Host [...]

Subscribe to our newsletter to receive security tips everday!