Exploitation

Home/Exploitation
6 03, 2025

LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert

By | 2025-03-17T22:59:07+05:30 March 6th, 2025|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update, Tips|

Cybersecurity researchers at G DATA have discovered a new malware campaign using fake booking websites [...]

5 03, 2025

Cisco Webex for BroadWorks Flaw Could Expose User Credentials

By | 2025-03-17T23:05:26+05:30 March 5th, 2025|BOTNET, cisco, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips, vulnerability|

Cisco has disclosed a vulnerability in Webex for BroadWorks that could let attackers intercept user [...]

3 03, 2025

Android Phones Unlocked via Cellebrite Zero-Day Exploit

By | 2025-03-17T23:19:46+05:30 March 3rd, 2025|Android malware, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day [...]

3 03, 2025

Chinese Hackers Exploit Check Point VPN Zero-Day

By | 2025-03-03T07:03:33+05:30 March 3rd, 2025|BOTNET, Exploitation, Security Advisory, Security Update, vulnerability, Zero Day Attack|

Chinese hackers exploited a patched Check Point VPN flaw (CVE-2024-24919) to target organizations in Europe, [...]

3 03, 2025

Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws

By | 2025-03-03T23:29:34+05:30 March 3rd, 2025|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, Tips|

At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing [...]

Subscribe to our newsletter to receive security tips everday!