cyberattack

2 02, 2024

A critical vulnerability in Apple iOS and macOS has been discovered and exploited

By | 2024-02-15T08:10:52+05:30 February 2nd, 2024|Apple, BOTNET, Compromised, cyberattack, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

The Cybersecurity and Infrastructure Security Agency has identified a security flaw in Apple operating systems, [...]

30 01, 2024

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

By | 2024-01-30T21:13:06+05:30 January 30th, 2024|BOTNET, Compromised, cyberattack, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

A recently discovered ransomware, named "Kasseika," employs Bring Your Own Vulnerable Driver tactics to incapacitate [...]

16 01, 2024

Can Patches Prevent Zero-Day Attacks?

By | 2024-01-18T10:57:01+05:30 January 16th, 2024|Backdoor, BOTNET, Compromised, cyberattack, Darknet, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Malware, Security Advisory, Security Update, Zero Day Attack|

In recent years, zero-day exploits and attacks have emerged as prominent threats. Leveraging unknown vulnerabilities [...]

16 01, 2024

Windows SmartScreen Bypass Exploited by Information Stealer

By | 2024-01-16T23:18:38+05:30 January 16th, 2024|BOTNET, Compromised, cyberattack, Exploitation, infostealer, Internet Security, IOC's, malicious cyber actors, Malware, Security Advisory, Security Update|

The malicious campaign leverages the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to propagate Phemedrone [...]

12 01, 2024

Researchers identify FBot hacking tool hijacking cloud and payment services.

By | 2024-01-18T10:56:41+05:30 January 12th, 2024|BOTNET, Compromised, cyberattack, Darknet, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

SentinelOne's malware hunters flagged a recently uncovered Python-based hacking tool employed by cybercriminals to hijack [...]

Subscribe to our newsletter to receive security tips everday!