Exploitation

Home/Exploitation
2 01, 2024

Microsoft Disables MSIX App Installer Protocol

By | 2024-01-04T07:17:20+05:30 January 2nd, 2024|Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

Microsoft has disabled the MSIX installer protocol in Windows in response to its exploitation in [...]

30 12, 2023

Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain

By | 2024-01-04T07:17:02+05:30 December 30th, 2023|Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, vulnerability|

A recent Unit 42 investigation uncovered a dual privilege escalation chain affecting Google Kubernetes Engine [...]

29 12, 2023

Xamalicious Trojan Hits Over 327K Android Devices

By | 2024-01-11T11:44:52+05:30 December 29th, 2023|Android malware, BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, vulnerability|

Researchers uncovered a novel Android backdoor named Xamalicious at the end of 2023. This malware [...]

28 12, 2023

Remote Encryption Attacks -Explanation & Mitigation

By | 2024-01-11T11:41:35+05:30 December 28th, 2023|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update|

The digital landscape is witnessing a rise in sophisticated ransomware attacks, specifically remote encryption attacks. [...]

27 12, 2023

Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware

By | 2024-01-05T10:52:27+05:30 December 27th, 2023|Compromised, Exploitation, malicious cyber actors, Malicious extension, Malware, Microsoft, Security Advisory, Security Update|

A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to [...]

Subscribe to our newsletter to receive security tips everday!