Exploit
- APPLICATIONS
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency…
Read More » - APPLICATIONS
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions
Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to…
Read More » - LAPTOP
Diablo 4 exploit lets you complete March of the Goblins way faster
Diablo 4’s March of the Goblins event made Treasure Goblins spawn more often. But one area had way too many.…
Read More » - APPLICATIONS
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
Mar 03, 2025Ravie LakshmananCloud Security / Email Security Threat actors are targeting Amazon Web Services (AWS) environments to push out…
Read More » - APPLICATIONS
Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
Mar 03, 2025Ravie LakshmananRansomware / Vulnerability Threat actors have been exploiting a security vulnerability in Paragon Partition Manager’s BioNTdrv.sys driver…
Read More » - REVIEWS
Serbian student’s Android phone compromised by exploit from Cellebrite
Amnesty International on Friday said it determined that a zero-day exploit sold by controversial exploit vendor Cellebrite was used to…
Read More » - APPLICATIONS
Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
Feb 20, 2025Ravie LakshmananRansomware / Vulnerability A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare…
Read More » - APPLICATIONS
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via…
Read More » - APPLICATIONS
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…
Read More »