Exploitation

Home/Exploitation
29 02, 2024

Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes

By | 2024-03-01T23:10:53+05:30 February 29th, 2024|BOTNET, Compromised, Exploitation, hackers, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of [...]

28 02, 2024

Malicious npm Packages: North Korean Hackers Targeting Developers

By | 2024-03-11T05:34:07+05:30 February 28th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Mobile Security, Security Advisory, Security Update|

Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the [...]

27 02, 2024

Xeno RAT Exploits Windows DLL Search to Evade Detection

By | 2024-02-28T09:46:03+05:30 February 27th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Tips, windows|

A newly identified, sophisticated malware coded in C# has emerged. Dubbed Xeno RAT, this malware [...]

26 02, 2024

Compromised PyPI Package Deploys NovaSentinel Stealer on Windows

By | 2024-03-11T05:32:58+05:30 February 26th, 2024|Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Tips, windows|

Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, [...]

26 02, 2024

LockBit Returns, Unveiling Fresh Claims and Victims

By | 2024-02-28T09:41:46+05:30 February 26th, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Ransomware, Security Advisory, Security Update, Tips|

The narrative surrounding the takedown of the LockBit ransomware on February 19 is still evolving. [...]

Subscribe to our newsletter to receive security tips everday!