exploits

Microsoft Exchange ProxyShell exploits used to deploy Babuk ransomware

The ProxyShell attacks against vulnerable Microsoft Exchange servers started several months ago, with LockFile and Conti being among the first… Read More

3 years ago

Threat actor exploits MS ProxyShell flaws to deploy Babuk ransomware

Talos researchers warn of a new threat actor that is hacking Microsoft Exchange servers by exploiting ProxyShell flaws to gain… Read More

3 years ago

CISA Urges Vendors to Patch BrakTooth Bugs after Exploits Release

Researchers have released public exploit code and a proof of concept tool to test Bluetooth devices against System-on-a-Chip (SoC) security… Read More

3 years ago

Webdiscover – The Purpose Of This Script Is To Automate The Web Enumeration Process And Search For Exploits

The purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools… Read More

3 years ago

SpoolSploit – A Collection Of Windows Print Spooler Exploits Containerized With Other Utilities For Practical Exploitation

A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print… Read More

3 years ago

ZuRu Malware Exploits Baidu Search Results

Experts reported new Mac ZuRu malware spreading via poisoned search engine results in China via Baidu. The criminals masquerade as… Read More

3 years ago

Researcher Publishes Proof–of-Concept Exploits for Three iOS Zero-day Flaws that Lack Patches

The proof-of-concept exploit code for three iOS zero-day vulnerabilities (and a fourth one patched in July) was published on GitHub… Read More

3 years ago

Spook.js – New side-channel attack can bypass Google Chrome’s protections against Spectre-style exploits

A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defenses to… Read More

3 years ago

Conti ransomware now hacking Exchange servers with ProxyShell exploits

While Microsoft fully patched these vulnerabilities in May, technical details regarding exploiting the vulnerabilities were recently released, allowing threat actors… Read More

3 years ago

LockFile Ransomware Exploits PetiPotam To Attack Windows Domains

Microsoft has recently fixed a severe vulnerability that could allow PetiPotam NTLM relay attacks. However,… LockFile Ransomware Exploits PetiPotam To… Read More

3 years ago

North Korean Hacker Group Uses Browser Exploits

The security experts of the cybersecurity firm, Volexity have recently reported an attack through which the North Korean Hacker Group… Read More

3 years ago

CamRaptor – a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials

Features Exploits vulnerabilities in most popular camera models such as Novo, CeNova and QSee. Optimized to exploit multiple cameras at one time from list… Read More

3 years ago

North Korean APT InkySquid Infects Victims Using Browser Exploits

Volexity attributes the compromise of the Daily NK website to a threat actor it refers to as InkySquid, which broadly… Read More

3 years ago

Exploit broker Zerodium is looking for VMware vCenter Server exploits

Zero-day exploit broker Zerodium announced it is looking for zero-day exploits for VMware vCenter Server. The company will pay up… Read More

3 years ago

Hacker Deposited $1M on Popular Cybercrime Marketplace to Buy Zero-day Exploits

According to experts, the member “integra” has joined the forum in September 2012 and has gained a high reputation over… Read More

3 years ago

CamRaptor – Tool That Exploits Several Vulnerabilities In Popular DVR Cameras To Obtain Network Camera Credentials

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials. Features Exploits vulnerabilities… Read More

3 years ago