Exploitation

Home/Exploitation
24 01, 2024

Apple resolves the first zero-day bug exploited in attacks this year

By | 2024-02-14T22:57:09+05:30 January 24th, 2024|Apple, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Apple has issued security updates to tackle the first zero-day vulnerability of the year, which [...]

24 01, 2024

GitHub Developer SSH Keys Targeted Through Malicious npm Packages

By | 2024-01-25T07:02:41+05:30 January 24th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Security researchers recently discovered two new malicious packages on the npm open source package manager. [...]

24 01, 2024

Active Exploitation of 2 Citrix Remote Code Execution (RCE) Vulnerabilities, CISA Issues Notification

By | 2024-01-25T07:03:05+05:30 January 24th, 2024|BOTNET, cisco, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

CISA has set a deadline of one to three weeks for addressing three vulnerabilities associated [...]

23 01, 2024

New Godzilla Web Shell Attacks Exploit Apache ActiveMQ Flaw

By | 2024-01-25T07:03:34+05:30 January 23rd, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update|

Cybersecurity researchers caution about a significant rise in threat actor activity exploiting a recently patched [...]

22 01, 2024

LockBit Ransomware Uses Resume Word Files to Spread

By | 2024-01-23T08:47:07+05:30 January 22nd, 2024|Compromised, Exploitation, Internet Security, Malware, Mobile Security, Ransomware, Security Advisory, Security Update|

An ASEC investigation has uncovered the latest tactics employed by the notorious LockBit ransomware. Under [...]

Subscribe to our newsletter to receive security tips everday!