Exploitation

Home/Exploitation
9 05, 2023

New KEKW malware infects open source Python Wheel files

By | 2023-05-11T06:38:18+05:30 May 9th, 2023|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

The KEKW malware employs a malicious function known as system_information() to gather a wide range [...]

8 05, 2023

Cisco Phone Adapters Flaw Let Attackers Execute Arbitrary Code

By | 2023-05-08T20:41:04+05:30 May 8th, 2023|Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips, vulnerability|

Cisco SPA112 2-Port Phone Adapters have been reported to be vulnerable to arbitrary code execution via a [...]

8 05, 2023

New ‘Cactus’ Ransomware Encrypts Itself to Evade Detection

By | 2023-05-11T07:00:11+05:30 May 8th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, Ransomware, Security Advisory, Security Update, vulnerability|

A novel ransomware strain dubbed ‘Cactus’ has been found to be exploiting vulnerabilities in Fortinet VPN devices [...]

5 05, 2023

Sandworm Attackers Use WinRAR to Wipe Data from Government Devices

By | 2023-05-11T06:57:07+05:30 May 5th, 2023|BOTNET, cyberattack, Darknet, Data Breach, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

Sandworm (UAC-0165), a Russian hacking group, has been linked to an attack on Ukrainian state [...]

5 05, 2023

South Korean Lures Used to Deploy ROKRAT Malware

By | 2023-05-05T01:54:46+05:30 May 5th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

The North Korean threat actor known as APT37 has been observed changing deployment methods and [...]

Subscribe to our newsletter to receive security tips everday!