Malicious extension

Home/Malicious extension
13 12, 2022

MegaRAC flaws, IP leak impact multiple server brands

By | 2022-12-14T09:37:48+05:30 December 13th, 2022|BOTNET, Compromised, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Software Issues, Targeted Attacks, Tips|

Research team has found three different vulnerabilities in the MegaRAC Baseboard Management Controller (BMC) software. [...]

12 12, 2022

Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware

By | 2022-12-12T20:21:33+05:30 December 12th, 2022|BOTNET, Compromised, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update, Woody RAT malware|

A cryptocurrency mining attack targeting the Linux operating system also involved the use of an [...]

7 12, 2022

New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network

By | 2022-12-09T23:21:37+05:30 December 7th, 2022|BOTNET, Compromised, DDOS, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Security Advisory, Security Update|

 Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security [...]

5 12, 2022

Critical Ping bug potentially allows remote hack of FreeBSD systems

By | 2022-12-09T23:20:40+05:30 December 5th, 2022|BOTNET, Compromised, Data Breach, Evilproxy, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware|

A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take [...]

30 11, 2022

Google discovers Windows exploit framework used to deploy spyware

By | 2022-12-09T23:29:18+05:30 November 30th, 2022|BOTNET, Compromised, Exploitation, hackers, malicious cyber actors, Malicious extension, Malware, Security Advisory, Security Update|

A Spanish company that offers “tailor made Information Security Solutions” may have exploited vulnerabilities in [...]

Subscribe to our newsletter to receive security tips everday!