Exploitation

Home/Exploitation
3 03, 2025

Chinese Hackers Exploit Check Point VPN Zero-Day

By | 2025-03-03T07:03:33+05:30 March 3rd, 2025|BOTNET, Exploitation, Security Advisory, Security Update, vulnerability, Zero Day Attack|

Chinese hackers exploited a patched Check Point VPN flaw (CVE-2024-24919) to target organizations in Europe, [...]

3 03, 2025

Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws

By | 2025-03-03T23:29:34+05:30 March 3rd, 2025|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, Tips|

At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing [...]

26 02, 2025

GRUB2 Vulnerabilities Put Millions of Linux Devices at Risk

By | 2025-02-28T23:16:09+05:30 February 26th, 2025|Exploitation, Internet Security, Linux Malware, Malware, Regulation, Security Advisory, Security Update, Tips, vulnerability|

GRUB2 vulnerabilities expose millions of Linux devices to secure boot bypass and remote code execution. [...]

20 02, 2025

PoC exploit released for vulnerabilities in Ivanti Endpoint Manager

By | 2025-03-17T23:11:26+05:30 February 20th, 2025|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

Researchers found four critical Ivanti EPM vulnerabilities allowing unauthenticated attackers to exploit machine credentials for [...]

Subscribe to our newsletter to receive security tips everday!