exploits

  1. Friend

    NSO Group exploits detected in Mongolian networks

    Google has uncovered spying on government networks with a clever way to infect. Google experts recorded several cyberattacks on Mongolian government websites between November 2023 and July 2024. Hackers used vulnerabilities in iOS and Android to steal user data. Watering hole attacks were...
  2. Man

    Exploits / Buffer Overflows

    If you visit any vulnerability publishing website (such as CVE), you'll find numerous exploits presented in code that might appear cryptic at first glance, similar to the examples provided below: This article aims to demystify the combination of Assembly and shell code, typically executed in...
  3. Tomcat

    Exploits for the Apache HugeGraph vulnerability are freely available

    Administrators need to update immediately, as exploits only increase the risk of losing control of the server and data. SecureLayer7 specialists provided a detailed analysis of the vulnerability in the popular Apache HugeGraph graph database, which allows Remote Code Execution( RCE)...
  4. Tomcat

    PowerLoader 64-bit updated with new LPE exploits

    A few months ago we wrote about PowerLoader. This malicious code uses an interesting method of privilege escalation in the context of explorer.exe. The PowerLoader source code that has been made available to the public is also used in other families of malware. For example, Win32/Gapz bootkit...
  5. Tomcat

    RCE exploits are already in the public domain: update Telerik Report Server as soon as possible

    Two critical vulnerabilities allow hackers to take over your network without much effort. Cybersecurity researchers have published a PoC exploit demonstrating a chain of remote code execution (RCE) vulnerabilities in Progress Software's Telerik Report Server. Telerik Report Server is a...
  6. Tomcat

    Security Week 17: Hacking SWIFT and cash registers, extortion in Android with exploits, bypassing AppLocker

    Financial cyber fraud most often affects ordinary people, bank clients, but financial institutions themselves also experience problems as a result. Everyone suffers from the fact that user devices are easier to attack than banking infrastructure. But there are exceptions: the Carbanak campaign...
  7. Teacher

    SiCat: a revolution in the search for exploits or a new tool for hackers?

    The assistant of information security specialists can become a powerful weapon of evil. An open-source tool for investigating vulnerabilities in the cybersecurity system called SiCat has become available online. Developed by Akas Visnu Aji, SiCat is a powerful system for finding information...
  8. Carding 4 Carders

    Mirai is coming: IZ1H9 group successfully deployed 13 exploits in the last month

    Even the most popular models of routers and IoT devices will not resist the onslaught of hackers. The FortiGuard Labs division of Fortinet revealed the activity of the IZ1H9 hacker group, aimed at Internet of Things devices to infect them with the Mirai botnet. In September, hackers...
  9. Carding

    New malware for macOS exploits zero-day vulnerability

    A new Remote Access Tool (RAT) attacks macOS using a zero-day vulnerability to gain root access. The malware was named Proton, according to Sixgill researchers, it was found on a Russian closed forum for cybercriminals. At the moment, the malware is offered $ 2,500 for one-time use, and for 10...
  10. Carding

    Exploits

    Exploits are a subtype of malware. The term is related to the English verb "to exploit", meaning "to exploit, to use in one's own interests." However, an exploit is not necessarily a separate application (executable file): it can take the form of a small piece of malicious code or a set of...
  11. R

    SpyEye Setup Service *OR* Builds with modules

    =))
  12. N

    ``TRUE MALWARE SERVICES & CO ´´

    Hello dear members, Offering here best malware related services. - Setuping your own botnet. - Making your exe undetected by antivirus soft. - Creating custom injects, auto transfer systems, fakes. - Bulletproof hosting. (inmunity) - Offshore domains. - Exploits Java,PDF,Flash,XLS. (rent/clean...
Top