Home

Android Phones Unlocked via Cellebrite Zero-Day Exploit

Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day exploit chain from Cellebrite to unlock a student activist's Android phone. Cellebrite Zero-Day Exploit The [...]

Chinese Hackers Exploit Check Point VPN Zero-Day

Chinese hackers exploited a patched Check Point VPN flaw (CVE-2024-24919) to target organizations in Europe, Africa, and the Americas, researchers say. All about the attack The attacks, from June 2024 [...]

Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws

At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing how hackers can use these devices to steal data and invade privacy. The talk, DriveThru [...]

Pass-the-Cookie attacks bypass MFA, granting full account access

Pass-the-Cookie attacks let hackers bypass MFA using stolen browser cookies, putting corporate accounts at risk across Office 365, Azure, and more. MFA works by verifying users through multiple factors, but [...]

By | February 28th, 2025|Security Update, Internet Security, Microsoft, Security Advisory, Tips|0 Comments

Cisco Nexus Vulnerability Allows Malicious Command Injection

Cisco has released a critical advisory for a command injection vulnerability (CVE-2025-20161) affecting its Nexus 3000 and 9000 Series switches running in standalone NX-OS mode. Cisco Nexus Vulnerability This flaw [...]

Subscribe to our newsletter to receive security tips everday!