Thursday, October 24, 2024

Exploit

Smominru Botnet Hacked 90,000 Windows Computers in Last Month Using EternalBlue Exploit

Threats actors behind the Smominru botnet compromised nearly 90,000 windows computers in last month using EternalBlue exploit and performing brute force attacks on MS-SQL,...

NetCAT – New Attack Allow Hackers to Spy & Steal the Data From Intel CPU Remotely

A new flaw named as NetCAT affects the Intel CPU's that allows attackers to steal sensitive data from untrusted clients over the network.NetCAT (Netowork...

Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol

Metasploit published a public exploit for BlueKeep, the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2.The Bluekeep is a wormable...

Zerodium Now Paying You $2.5 Million For Android Zero-day Exploit and $1.5 Million for WhatsApp RCE Exploit

Exploit acquisition platform Zerodium released a new payout for mobile exploits with surprising payment for both Android and iOS platforms.Zerodium, a Cybersecurity company known...

What is EternalBlue? How Does it used by Cyber Criminals to Hack Millions of Windows Computers

EternalBlue is a powerful exploit created by the U.S National security Agency(NSA). The tool was stolen from them in 2017, and a group calling...

2 “Wormable” Bluekeep Based RCE Bugs in Windows Remote Desktop Services let Hackers Control Your System Remotely

Microsoft released new security updates under Patch Tuesday for August and fixed more than 90 vulnerabilities including 2 Bluekep based "wormable "remote code execution...

Hackers Exploit the SMS Gateway to Sent Text Millions of U.S Phone Numbers

Hackers who have compromised SmartTVs, Chromecast devices and thousands of vulnerable printers to promote PewDewPie Youtube channel, now back to form and exploits the SMS...

Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

The researcher discovered a code execution vulnerability in LibreOffice let an attacker hack your computer by just sending a weaponized document with macro and...