Exploitation

Home/Exploitation
31 10, 2023

Arid Viper target Android users with spyware

By | 2023-11-15T07:26:55+05:30 October 31st, 2023|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, spyware|

The hacking group known as Arid Viper (also identified as APT-C-23, Desert Falcon, or TAG-63) [...]

31 10, 2023

Malicious NuGet Packages Caught Distributing SeroXen RAT Malware

By | 2023-11-03T07:40:53+05:30 October 31st, 2023|BOTNET, Data Breach, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update, Tips|

Cybersecurity experts have discovered a fresh batch of malicious packages distributed through the NuGet package [...]

30 10, 2023

Lazarus hackers targeted a software vendor using known vulnerabilities

By | 2023-11-01T08:35:23+05:30 October 30th, 2023|BOTNET, Compromised, cyberattack, Data Breach, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, vulnerability|

A recent cyber campaign attributed to the Lazarus hackers from North Korea appears to have [...]

27 10, 2023

Critical Vulnerability in F5 BIG-IP Configuration Utility Allows Request Smuggling, Leads to RCE: CVE-2023-46747

By | 2023-11-01T08:33:04+05:30 October 27th, 2023|BOTNET, Compromised, cyberattack, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Security Advisory, Security Update, vulnerability|

A critical vulnerability, known as CVE-2023-46747, has been uncovered in F5 BIG-IP products, allowing unauthenticated [...]

27 10, 2023

Safari Vulnerability Exposes Apple iPhones and Macs Powered by A and M-Series CPUs to Security Risks

By | 2023-11-01T08:57:10+05:30 October 27th, 2023|Apple, BOTNET, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, vulnerability|

A team of researchers has developed an innovative side-channel attack called iLeakage, which takes advantage [...]

Subscribe to our newsletter to receive security tips everday!