10,000+ WordPress sites exposed by donation plugin vulnerability
A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of remote code execution since March 3, 2025. Known as CVE-2025-0912, this bug [...]
Google’s Email Shield hides your real email from apps
Google is developing Shielded Email, a tool that creates disposable email aliases to protect users’ real Gmail addresses when signing up for apps and services, helping to reduce spam. Discovered [...]
Android Phones Unlocked via Cellebrite Zero-Day Exploit
Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day exploit chain from Cellebrite to unlock a student activist's Android phone. Cellebrite Zero-Day Exploit The [...]
Chinese Hackers Exploit Check Point VPN Zero-Day
Chinese hackers exploited a patched Check Point VPN flaw (CVE-2024-24919) to target organizations in Europe, Africa, and the Americas, researchers say. All about the attack The attacks, from June 2024 [...]
Hackers Can Break Into Car Cameras in Minutes by Exploiting Security Flaws
At Black Hat Asia 2025, experts will reveal a major flaw in modern dashcams, showing how hackers can use these devices to steal data and invade privacy. The talk, DriveThru [...]
Get Social