Home 2017-08-28T17:57:09+05:30

TP-Link Router Vulnerabilities Enable Malicious SQL Execution

Cybersecurity researchers have found critical SQL injection vulnerabilities in four TP-Link router models, which could allow attackers to bypass authentication, execute malicious commands, and potentially take control of the devices. [...]

Hackers Leverage Cloudflare for RAT Deployment

Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like AsyncRAT, according to Sekoia TDR. Complex malware attacks are using phishing emails [...]

Infostealer Malware Surges 84% in Phishing Emails, IBM Warns

A recent report from IBM X-Force reveals that infostealer malware delivered through phishing emails has spiked by 84% week-over-week in 2024. This surge highlights a shift in cyberattack strategies, with [...]

KeyPlug Server Leak Reveals Fortinet Exploits

Cybersecurity researchers recently uncovered a server linked to the KeyPlug malware, used by the threat group RedGolf (also known as APT41). The server was accidentally exposed for less than 24 [...]

Subscribe to our newsletter to receive security tips everday!