Home

Increasing Investors in NFT leads Hackers to Target NFT Sites

Due to the hiking interests towards the Pixelmon NFT Site, the threat actors have turned their attention towards them. Pixelmon is an Open World RPG NFT game. The player can [...]

By | May 16th, 2022|Malware, Compromised, Exploitation, Tips|0 Comments

BPFDoor with Firewall Security evasion, Linux Specific

Recently, BPFDoor - a malware was brought to light after years under the radar. It allows a threat actor to backdoor a system for remote code execution. It does not [...]

By | May 13th, 2022|Targeted Attacks, Compromised, Exploitation, Malware|0 Comments

Ramping efforts of Russian Hackers against the Satellites of SpaceX

Starlink is Satellite Internet Company owned by Elon Musk and it was activated in Ukraine after Russia crippled the country's communication systems during the ongoing war Starlink Resistance Recently, Musk [...]

By | May 12th, 2022|Targeted Attacks|0 Comments

Microsoft Exchange Servers affected by Post-Exploitation Malware

A post-exploitation malware Framework set down within the Microsoft Exchange Servers of organizations in various sectors across multiple regions. This campaign seems to be gathering intelligence and is tethered to [...]

By | May 12th, 2022|Malware, Compromised, Exploitation, Microsoft, Targeted Attacks|0 Comments

F5 Released Security Patches for the “CVE-2022-1388” – Act Immediately

Admins have been warned by the security researchers against a critical Remote-Control Execution (RCE) flaw in the F5 BIG-IP.   Last week F5-Security and Application Delivery Solutions Provider, released its security [...]

By | May 10th, 2022|Security Update, Internet Security, Ransomware, Tips|0 Comments

Subscribe to our newsletter to receive security tips everday!