Exploitation

Home/Exploitation
14 03, 2025

Juniper Junos OS Vulnerability Exploited, CISA Warns

By | 2025-03-17T20:49:20+05:30 March 14th, 2025|BOTNET, Compromised, Exploitation, Internet Security, Security Advisory, Security Update, vulnerability|

CISA has warned about a Junos OS vulnerability (CVE-2025-21590) in Juniper Networks. This flaw allows [...]

11 03, 2025

Android Zygote Flaw Enables Code Execution and Privilege Escalation

By | 2025-03-17T23:05:04+05:30 March 11th, 2025|Android malware, Compromised, Exploitation, Internet Security, Malicious extension, Malware, Security Advisory, Security Update, vulnerability|

A major vulnerability, CVE-2024-31317, has been discovered in Android, allowing attackers to exploit the Zygote [...]

6 03, 2025

LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert

By | 2025-03-17T22:59:07+05:30 March 6th, 2025|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Malware, Security Advisory, Security Update, Tips|

Cybersecurity researchers at G DATA have discovered a new malware campaign using fake booking websites [...]

5 03, 2025

Cisco Webex for BroadWorks Flaw Could Expose User Credentials

By | 2025-03-17T23:05:26+05:30 March 5th, 2025|BOTNET, cisco, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips, vulnerability|

Cisco has disclosed a vulnerability in Webex for BroadWorks that could let attackers intercept user [...]

3 03, 2025

Android Phones Unlocked via Cellebrite Zero-Day Exploit

By | 2025-03-17T23:19:46+05:30 March 3rd, 2025|Android malware, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, Zero Day Attack|

Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day [...]

Subscribe to our newsletter to receive security tips everday!