Exploitation

Home/Exploitation
13 03, 2024

PixPirate, an Android banking malware

By | 2024-03-19T03:10:27+05:30 March 13th, 2024|Android banking trojan, Android malware, BOTNET, Compromised, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers [...]

13 03, 2024

Adobe Reader Infostealer Spreads Through Email in Brazil

By | 2024-03-15T07:57:55+05:30 March 13th, 2024|BOTNET, Compromised, Exploitation, infostealer, Internet Security, Malware, Security Advisory, Security Update|

A recent email spam campaign is distributing infostealer malware disguised as an Adobe Reader Installer. [...]

12 03, 2024

BianLian Exploits TeamCity Vulnerability to Install Backdoors

By | 2024-08-02T22:48:50+05:30 March 12th, 2024|Backdoor, Exploitation, Malware, Security Advisory, Security Update, vulnerability|

The cybercriminal group BianLian, recognized for their ransomware assaults, has garnered attention from the information [...]

11 03, 2024

Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers

By | 2024-03-12T20:44:00+05:30 March 11th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Remote code execution, Security Advisory, Security Update, vulnerability|

A critical security flaw, identified as CVE-2024-21762, has been uncovered in Fortinet's FortiOS and FortiProxy [...]

8 03, 2024

CHAVECLOAK Malware Exploits Windows Through Weaponized PDF File

By | 2024-03-12T20:45:10+05:30 March 8th, 2024|Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, windows|

CHAVECLOAK is a type of malware, specifically a banking trojan, known for targeting users, particularly [...]

Subscribe to our newsletter to receive security tips everday!