Exploitation

Home/Exploitation
5 01, 2024

3 Malicious PyPI Packages Target Linux with Crypto Miners

By | 2024-01-11T11:29:53+05:30 January 5th, 2024|BOTNET, Compromised, Exploitation, Linux Malware, malicious cyber actors, Malware, Security Advisory, Security Update|

Fortinet researchers identified three malicious packages in the PyPI repository—modularseven, driftme, and catme. These packages, [...]

3 01, 2024

CISA Issues Alert for Juniper Secure Analytics Vulnerabilities

By | 2024-01-04T07:21:28+05:30 January 3rd, 2024|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) highlighted that Juniper has [...]

2 01, 2024

Microsoft Disables MSIX App Installer Protocol

By | 2024-01-04T07:17:20+05:30 January 2nd, 2024|Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Microsoft has disabled the MSIX installer protocol in Windows in response to its exploitation in [...]

30 12, 2023

Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain

By | 2024-01-04T07:17:02+05:30 December 30th, 2023|Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, vulnerability|

A recent Unit 42 investigation uncovered a dual privilege escalation chain affecting Google Kubernetes Engine [...]

Subscribe to our newsletter to receive security tips everday!