Exploitation

Home/Exploitation
30 01, 2024

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

By | 2024-01-30T21:13:06+05:30 January 30th, 2024|BOTNET, Compromised, cyberattack, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

A recently discovered ransomware, named "Kasseika," employs Bring Your Own Vulnerable Driver tactics to incapacitate [...]

25 01, 2024

Discovery of Authentication Bypass Vulnerability in GoAnywhere MFT

By | 2024-01-30T21:13:24+05:30 January 25th, 2024|Compromised, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Security Advisory, Security Update, vulnerability|

Fortra has revealed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software—an authentication [...]

24 01, 2024

Apple resolves the first zero-day bug exploited in attacks this year

By | 2024-02-14T22:57:09+05:30 January 24th, 2024|Apple, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Apple has issued security updates to tackle the first zero-day vulnerability of the year, which [...]

24 01, 2024

GitHub Developer SSH Keys Targeted Through Malicious npm Packages

By | 2024-01-25T07:02:41+05:30 January 24th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Security researchers recently discovered two new malicious packages on the npm open source package manager. [...]

24 01, 2024

Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification

By | 2024-01-25T07:03:05+05:30 January 24th, 2024|BOTNET, cisco, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

CISA has set a deadline of one to three weeks for addressing three vulnerabilities associated [...]

Subscribe to our newsletter to receive security tips everday!