Home

Hackers exploit Autodesk Drive to host weaponized PDF files

Autodesk Drive serves as a cloud-based data-sharing platform for organizations, facilitating document and file sharing. It accommodates various file formats, including 2D and 3D data files such as PDFs, accessible [...]

GuptiMiner Exploits eScan to Distribute Miners and Backdoors

Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system to surreptitiously implant backdoors and cryptocurrency mining software into users’ computers and extensive corporate networks. [...]

By | April 25th, 2024|BOTNET, Compromised, Exploitation, IOC's, malicious cyber actors|0 Comments

CrushFTP Zero-Day Enables Attackers to Gain Complete Server Access

CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0, allowing remote attackers with low privileges to bypass the VFS sandbox and read arbitrary files on the underlying [...]

Subscribe to our newsletter to receive security tips everday!