Exploitation

Home/Exploitation
27 04, 2023

VMware Resolves Crucial Pwn2Own Zero-Day Exploit Chain

By | 2023-05-01T20:54:22+05:30 April 27th, 2023|BOTNET, Compromised, Exploitation, malicious cyber actors, Security Advisory, Security Update, vmware, VMware, vulnerability, Zero Day Attack|

To address zero-day vulnerabilities that might be used to achieve code execution on computers using [...]

27 04, 2023

Evasive Panda’s Malicious Campaign Exploits Software Update Channels

By | 2023-04-27T21:56:33+05:30 April 27th, 2023|BOTNET, Compromised, cyberattack, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

Evasive Panda's malicious campaign uses the update channels of legitimate Chinese applications to deliver their [...]

26 04, 2023

Code Insight – VirusTotal Launched AI-Powered Malware Analysis Features

By | 2023-04-27T00:21:34+05:30 April 26th, 2023|BOTNET, Compromised, Exploitation, malicious cyber actors, Malicious extension, Malware|

An AI-powered code analysis feature was recently launched by VirusTotal, dubbed “Code Insight.” Google Cloud Security [...]

26 04, 2023

Yellow Pages Canada confirms cyberattack as BlackBasta leaks its data

By | 2023-04-26T01:23:27+05:30 April 26th, 2023|BOTNET, Compromised, Data Breach, Evilproxy, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

Yellow Pages Group, a Canadian directory publisher has confirmed to BleepingComputer that it has been [...]

25 04, 2023

Finding Decoy Dog Toolkit via Anomalous DNS Traffic

By | 2023-04-25T05:35:20+05:30 April 25th, 2023|Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts [...]

Subscribe to our newsletter to receive security tips everday!