IOC’s

Home/IOC's
2 01, 2023

PyTorch Machine Learning Framework Compromised with Malicious Dependency

By | 2023-01-02T22:33:28+05:30 January 2nd, 2023|Compromised, Exploitation, IOC's, malicious cyber actors, Security Advisory, Security Update|

The PyTorch team has issued a warning to users who installed PyTorch-nightly over the holidays, [...]

28 12, 2022

Critical Linux Kernel Vulnerability Let Attackers Execute Remote Code

By | 2023-01-03T05:50:46+05:30 December 28th, 2022|Compromised, Exploitation, hackers, Internet Security, IOC's, Linux Malware, malicious cyber actors, Malware, Security Advisory, Security Update, vulnerability|

A critical remote code execution vulnerability (CVE-2022-47939) has been identified in the ksmbd module of the Linux [...]

27 12, 2022

PrivateLoader PPI Service Found Distributing Info-Stealing RisePro Malware

By | 2022-12-27T23:02:43+05:30 December 27th, 2022|Compromised, Exploitation, hackers, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, windows|

PrivateLoader is an active malware in the loader market, used by multiple threat actors to deliver [...]

27 12, 2022

GuLoader Malware Utilizing New Techniques to Evade Security Software

By | 2022-12-27T07:07:19+05:30 December 27th, 2022|Compromised, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malware, Security Advisory, Security Update, Tips|

Cybersecurity researchers exposed new evasion techniques adopted by an advanced malware downloader called GuLoader.  GuLoader malware GuLoader  is a first-stage [...]

22 12, 2022

ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082)

By | 2022-12-22T09:58:44+05:30 December 22nd, 2022|Compromised, Data Breach, Evilproxy, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, vulnerability|

Reports says, the zero-day vulnerabilities CVE-2022-41040 and CVE-2022-41082, dubbed ProxyNotShell, are still being actively exploited.  ProxyNotShell vulnerabilities are [...]

Subscribe to our newsletter to receive security tips everday!