Cybersecurity researchers unveiled the existence of a highly sophisticated spyware framework that has been in operation for a few years that allowed the attacker to spy on diplomatics computers. Use your skills to identify the malware.
VideoLAN recently published a security advisory warning of a Buffer Overflow vulnerability of the VLC Media Player. An employee from a local IT company used the vulnerable version and became a victim.
Hackers offered a Zero-Day Exploit for the Video conference app Zoom. The exploit will allow the hacker to view other user's calls.
A hacking group has updated its unique TTP (tactics, techniques, and procedures) and changed its encryption alphabets, string encryption, and commands for the bot and the main module to evade detection by security tools. You, as the Exploit specialist, was called break-down their exploit and bypass their new security updates.
The attack used the BlackHole exploit kit, which redirected the web site's visitors to an external malware-hosting site. You have been tasked to identify the malware in-depth and check for any weaknesses in the code.