The obfuscated code inside an .svg file downloaded from one of the porn sites. Credit: Malwarebytes The obfuscated code inside […]
Category: exploits
Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments
Jul 24, 2025Ravie LakshmananVirtualization / Network Security Virtualization and networking infrastructure have been targeted by a threat actor codenamed Fire […]
What to know about ToolShell, the SharePoint threat under mass exploitation
Microsoft fixed the vulnerability pair—CVE-2025-49706 and CVE-2025-49704—two weeks ago as part of the company’s monthly update release. As the world […]
Actively exploited vulnerability gives extraordinary control over server fleets
On Wednesday, CISA added CVE-2024-54085 to its list of vulnerabilities known to be exploited in the wild. The notice provided […]
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Skip to content A skeleton key for hackers The publicly available exploits provide a near-universal way to bypass key protections. […]
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud […]
Jury orders NSO to pay $167 million for hacking WhatsApp users
A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based NSO Group […]
“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.
A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly […]