Exploitation

Home/Exploitation
7 03, 2024

Web Server Compromised by Hackers for z0Miner Malware Deployment

By | 2024-03-11T05:15:52+05:30 March 7th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

The malicious actor, known as "z0miner," has been discovered targeting Korean WebLogic servers to disseminate [...]

6 03, 2024

WogRAT Malware Leverages Notepad Service to Target Windows & Linux Systems

By | 2024-03-07T21:59:08+05:30 March 6th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Linux Malware, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, windows|

Malware leverages the Notepad service to target systems like Windows and Linux, exploiting the ubiquity [...]

5 03, 2024

Cybercriminals Employing Innovative DNS Hijacking Technique for Investment Scams

By | 2024-03-06T22:51:03+05:30 March 5th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

A recently identified DNS threat actor known as Savvy Seahorse is employing advanced tactics to [...]

4 03, 2024

SMS Bombing: The Risks and Dangers of Text Message Attacks

By | 2024-03-19T03:11:40+05:30 March 4th, 2024|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips|

In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with [...]

4 03, 2024

Beware: Business Email Compromise (BEC) Attacks Threaten Organizations

By | 2024-03-06T22:52:15+05:30 March 4th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Mobile Security, phishing, Security Advisory, Security Update, Spam, Tips|

The pandemic has spurred significant shifts in business models. With the rise of digital transformation, [...]

Subscribe to our newsletter to receive security tips everday!