Exploitation

Home/Exploitation
21 06, 2023

SeroXen Malware Latest to Deploy BatCloak Evasion Tool

By | 2023-06-30T01:00:52+05:30 June 21st, 2023|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Security Advisory, Security Update, Tips|

Security researchers warn that malware developers are adopting a handy obfuscation tool to get malware [...]

19 06, 2023

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions

By | 2023-06-30T01:20:05+05:30 June 19th, 2023|Backdoor, BOTNET, Compromised, cyberattack, Data Breach, Evilproxy, Exploitation, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

A new stealer malware is on the rise, designed to obtain user credentials to help [...]

19 06, 2023

What Is the Principle of Least Privilege (POLP)?

By | 2023-06-26T22:00:16+05:30 June 19th, 2023|Evilproxy, Exploitation, Internet Security, Security Advisory, Security Update, Tips|

The principle of least privilege (POLP), also named the “principle of least authority” (POLA) or [...]

16 06, 2023

New Diicot group targets SSH servers with brute-force malware

By | 2023-06-19T08:25:24+05:30 June 16th, 2023|BOTNET, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

Diicot shares its new name with the Romanian anti-terrorist police unit and uses the same [...]

14 06, 2023

New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs

By | 2023-06-16T07:17:09+05:30 June 14th, 2023|Compromised, Data Breach, Exploitation, Internet Security, Malware, Security Advisory, Security Update, windows|

A new Golang-based information stealer called Skuld has compromised Windows systems across Europe, Southeast Asia, and the [...]

Subscribe to our newsletter to receive security tips everday!