Exploitation

Home/Exploitation
16 02, 2024

Malicious ‘SNS Sender’ Script Exploits AWS for Mass Smishing Campaigns

By | 2024-02-19T21:31:49+05:30 February 16th, 2024|BOTNET, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, phishing, Security Advisory, Security Update, Spam|

A malicious Python script named SNS Sender is being promoted as a tool for threat [...]

15 02, 2024

Shim Bootloader Vulnerability Detected in Linux Systems

By | 2024-02-21T23:44:26+05:30 February 15th, 2024|BOTNET, Exploitation, Linux Malware, Malware, Security Advisory, Security Update, Tips, vulnerability|

Security researchers have uncovered a critical vulnerability in Shim, a commonly used Linux bootloader. This [...]

15 02, 2024

Zoom patched seven vulnerabilities across Windows, iOS, and Android, including one critical flaw (CVE-2024-24691)

By | 2024-02-15T20:44:56+05:30 February 15th, 2024|Android malware, BOTNET, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, vulnerability, windows|

Zoom, the well-known video conferencing platform, recently patched 7 security vulnerabilities in a recent update. [...]

14 02, 2024

Beware of Malicious Fake ChatGPT Apps

By | 2024-02-15T08:08:56+05:30 February 14th, 2024|BOTNET, Compromised, Darknet, Exploitation, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

The public release of ChatGPT caused a sensation back in 2022, and it's fair to [...]

13 02, 2024

HijackLoader Malware Introduces Fresh Evasion Techniques

By | 2024-02-15T08:09:44+05:30 February 13th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Tips|

The HijackLoader malware has incorporated additional defense evasion tactics. Increasingly, other threat actors are leveraging [...]

Subscribe to our newsletter to receive security tips everday!