Exploitation

Home/Exploitation
11 03, 2024

Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers

By | 2024-03-12T20:44:00+05:30 March 11th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Remote code execution, Security Advisory, Security Update, vulnerability|

A critical security flaw, identified as CVE-2024-21762, has been uncovered in Fortinet's FortiOS and FortiProxy [...]

8 03, 2024

CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File

By | 2024-03-12T20:45:10+05:30 March 8th, 2024|Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, windows|

CHAVECLOAK is a type of malware, specifically a banking trojan, known for targeting users, particularly [...]

7 03, 2024

Web Server Compromised by Hackers for z0Miner Malware Deployment

By | 2024-03-11T05:15:52+05:30 March 7th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

The malicious actor, known as "z0miner," has been discovered targeting Korean WebLogic servers to disseminate [...]

6 03, 2024

WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems

By | 2024-03-07T21:59:08+05:30 March 6th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Linux Malware, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, windows|

Malware leverages the Notepad service to target systems like Windows and Linux, exploiting the ubiquity [...]

5 03, 2024

Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams

By | 2024-03-06T22:51:03+05:30 March 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

A recently identified DNS threat actor known as Savvy Seahorse is employing advanced tactics to [...]

Subscribe to our newsletter to receive security tips everday!