Exploit
- APPLICATIONS
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to…
Read More » - APPLICATIONS
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
May 14, 2025Ravie LakshmananVulnerability / Malware Samsung has released software updates to address a critical security flaw in MagicINFO 9…
Read More » - APPLICATIONS
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
May 14, 2025Ravie LakshmananRansomware / Vulnerability At least two different cybercrime groups BianLian and RansomExx are said to have exploited…
Read More » - APPLICATIONS
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
May 13, 2025Ravie LakshmananVulnerability / Threat Intelligence A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by…
Read More » - APPLICATIONS
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently…
Read More » - APPLICATIONS
Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet
May 06, 2025Ravie LakshmananInternet of Thing / Vulnerability Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life…
Read More » - APPLICATIONS
Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
Apr 28, 2025Ravie LakshmananCybersecurity / Hacking News What happens when cybercriminals no longer need deep skills to breach your defenses?…
Read More » - APPLICATIONS
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been observed exploiting two newly disclosed critical security flaws…
Read More » - APPLICATIONS
Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an…
Read More » - APPLICATIONS
Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials
In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed…
Read More »