Exploitation

Home/Exploitation
20 03, 2025

New malware uses JPEG files to hide and spread infostealers

By | 2025-04-08T21:59:54+05:30 March 20th, 2025|BOTNET, Compromised, Exploitation, infostealer, Malware, Security Advisory, Security Update|

A new cyber threat hides malware in JPEG images to steal credentials. Users download seemingly [...]

19 03, 2025

Threat Actors Steal 3.2 Billion Credentials, Infect 23 Million Devices

By | 2025-03-20T01:59:16+05:30 March 19th, 2025|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, Tips|

Flashpoint's 2024 report reveals a sharp rise in cyber threats, with 3.2 billion stolen credentials [...]

19 03, 2025

VPN Vulnerabilities Emerge as Key Target for Cyber Attacks on Organizations

By | 2025-03-20T01:59:40+05:30 March 19th, 2025|Exploitation, Internet Security, Security Advisory, Security Update, Tips, vulnerability|

VPN vulnerabilities have become a major threat to organizations worldwide. Cybercriminals and state-sponsored hackers are [...]

17 03, 2025

RansomHub via SocGholish, compromised sites

By | 2025-03-18T06:45:29+05:30 March 17th, 2025|BOTNET, Compromised, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update|

Threat actors behind SocGholish are now using hacked websites to spread RansomHub ransomware. The attack [...]

Subscribe to our newsletter to receive security tips everday!