Skip to content
Home » Exploits

Exploits

Ransomware Trends At a Glance

Ransomware is the most unpleasant phenomenon for a user. However, it is a gold mine for attackers, as people will pay good money to get their files back. Not surprisingly, news that a particular organization has fallen victim to a ransomware attack frequently appears. Unfortunately, as shows ransomware trends, scammers are not inclined to play the noble game, so without… Read More »Ransomware Trends At a Glance

What is Exploit? Definition and Examples

What is Exploit? Exploit Description & Example

Exploit, or vulnerability exploitation, is a cybersecurity violation that allows hackers to perform a row of different actions beyond the design limitations. They have their own classification and can be spotted by the software vendor, a white hat hacker, or the crooks themselves. But how does it work? And how to prevent vulnerability exploitation? Let’s find out. What is an… Read More »What is Exploit? Exploit Description & Example

Aspera Faspex Exploited to Deploy Ransomware

Aspera Faspex Vulnerability Allows Ransomware Spreading

Ransomware actors have recently been targeting IBM Aspera Faspex, a web-based application used for secure file sharing. According to reports, the attackers are exploiting a vulnerability, designated as CVE-2022-47986, which allows an attacker to remotely execute arbitrary code on the affected server. What is Aspera Faspex? Aspera Faspex is a software solution for secure and high-speed file transfer, developed by… Read More »Aspera Faspex Vulnerability Allows Ransomware Spreading

Cl0p Exploits GoAnywhere Breach, Strikes 130 Companies

GoAnywhere Vulnerability Exposes 130 Companies to Cl0p Ransomware

The recent outbreak of Cl0p ransomware touched a number of companies. Among them are not only mediocre organisations but also a number of worldwide-known names. Cl0p boasts of succeeding in all of these crimes using the GoAnywhere vulnerability. But what is that about? And how to protect against that breach? What is Cl0p ransomware? Cl0p is ransomware used by several… Read More »GoAnywhere Vulnerability Exposes 130 Companies to Cl0p Ransomware

NSA releases advices on securing PowerShell environment

NSA Advises On How To Secure Windows Devices With PowerShell

The National Security Agency (NSA) and several other cyber security partner agencies recently shared an advisory where they recommended to system administrators to use PowerShell in order to prevent and also detect all the malicious activities going on any Windows machine. PowerShell (or shortly PS) is Microsoft’s automation and configuration tool. Hackers often abuse it, mostly at stages after gaining… Read More »NSA Advises On How To Secure Windows Devices With PowerShell