One-Click Exploit: ASUS DriverHub RCE Vulnerability Exposes Admin Access

Welcome Back to HackingBlogs.com I apologize for the long break; I wasn’t feeling well. However, I’m back with a critical update on the ASUS DriverHub RCE vulnerability that needs your focus. Overview Security researcher Paul, commonly known as @MrBruh, has found a significant weakness in the preloaded DriverHub software from ASUS. The ASUS DriverHub RCE […]

One-Click Exploit: ASUS DriverHub RCE Vulnerability Exposes Admin Access Read More »

New Microsoft Accounts Is Passwordless by Default in 2025 : Here’s What It Means

Attention HackingBlogs_ readers!If you are keeping up with the most recent developments in authentication trends and cybersecurity, you can not overlook this significant change – new Microsoft accounts is passwordless by default in 2025. Microsoft is taking a risk by attempting to completely move away with traditional passwords, which will significantly reduce the success rate

New Microsoft Accounts Is Passwordless by Default in 2025 : Here’s What It Means Read More »

Apple Spyware Alert: Targeted Surveillance Hits Victims in 100 Countries

Welcome to HackingBlogs.com.Today, we are reporting on one of the year’s largest digital repression: Apple has issued a warning about spyware attacks in 100 countries. Journalists, activists, and political figures are being quietly monitored. This is more than just an informational story; it is a wake-up call. Apple’s warning notification makes it obvious that these

Apple Spyware Alert: Targeted Surveillance Hits Victims in 100 Countries Read More »

Linux Kernel Hacked: CVE-2025-21756 – Exploiting the Vsock UAF for Root Access

Executive Summary : The Linux kernel’s Vsock subsystem has a privilege escalation vulnerability known as CVE-2025-21756. It is brought on by an incorrect reference count decrease in the vsock_remove_sock function, which results in a Use After Free (UAF) condition. An attacker may cause a memory corruption by taking advantage of this UAF, which would enable

Linux Kernel Hacked: CVE-2025-21756 – Exploiting the Vsock UAF for Root Access Read More »

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models

Hey hackers, were you aware that a significant zero-day attack recently affected Viasat’s satellite modems? A serious flaw in these devices, which are essential for satellite internet, could allow attackers to run remote code without authentication. Read on to learn how this attack operates and why it is important it will change the face of

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models Read More »

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal

“The Indian Cyber Force strikes back after the Pahalgam attack, breaching Pakistan’s largest bank, HBL!” Hello My Dear Users Of HackingBlogs,Today We’ll be looking at the recent cyber strike made my the Indian Cyber Force. Who Are They, what data has been exposed what are it’s after cause and analysis of the data exposed. So

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal Read More »

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files

Hello HackingBlogs Users 🙂 Due to a recent error by Microsoft Defender, users of the malware analysis tool ANY.RUN unintentionally put private company files online, resulting in an unexpected flood of data exposure. Free-plan customers hurried to examine suspicious documents after a false positive flagged Adobe’s authentic Acrobat Cloud links as dangerous, not understanding their

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files Read More »

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI)

Summary: Policy Puppetry, a universal and flexible prompt injection technique developed by researchers at HiddenLayer, bypasses safety features in large language models (LLMs) in all of the major AI systems. Attackers can create dangerous content, including instructions for making deadly chemicals, encouraging violence, self-harm, and extracting system prompts, by using this technique to get over

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI) Read More »

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak

After claiming to have infiltrated TikTok and obtained the passwords of 972,528 users, the group of hackers R00TK1T ISC CYBER TEAM has caused controversy. The group claims that after initially alerting TikTok and not receiving a response, they started leaking the data in revenge. We are R00TK1T, warned ByteDance and TikTok, but their silence speaks

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak Read More »

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely

🚨 Alert for HackingBlogs Readers! 🚨 Hello there to people who landed here. Today we’ll covering specific detail about SuperCardX a latest Malware-as-a-Service (MaaS) for NFC relay fraud that runs on Android. This software, which Cleafy Labs discovered, allows hackers to do contactless payments without physically touching the victim’s card. This is an essential read

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely Read More »

Scroll to Top