Author name: Dipanshu Kumar

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models

Hey hackers, were you aware that a significant zero-day attack recently affected Viasat’s satellite modems? A serious flaw in these devices, which are essential for satellite internet, could allow attackers to run remote code without authentication. Read on to learn how this attack operates and why it is important it will change the face of …

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models Read More »

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal

“The Indian Cyber Force strikes back after the Pahalgam attack, breaching Pakistan’s largest bank, HBL!” Hello My Dear Users Of HackingBlogs,Today We’ll be looking at the recent cyber strike made my the Indian Cyber Force. Who Are They, what data has been exposed what are it’s after cause and analysis of the data exposed. So …

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal Read More »

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files

Hello HackingBlogs Users 🙂 Due to a recent error by Microsoft Defender, users of the malware analysis tool ANY.RUN unintentionally put private company files online, resulting in an unexpected flood of data exposure. Free-plan customers hurried to examine suspicious documents after a false positive flagged Adobe’s authentic Acrobat Cloud links as dangerous, not understanding their …

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files Read More »

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI)

Summary: Policy Puppetry, a universal and flexible prompt injection technique developed by researchers at HiddenLayer, bypasses safety features in large language models (LLMs) in all of the major AI systems. Attackers can create dangerous content, including instructions for making deadly chemicals, encouraging violence, self-harm, and extracting system prompts, by using this technique to get over …

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI) Read More »

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak

After claiming to have infiltrated TikTok and obtained the passwords of 972,528 users, the group of hackers R00TK1T ISC CYBER TEAM has caused controversy. The group claims that after initially alerting TikTok and not receiving a response, they started leaking the data in revenge. We are R00TK1T, warned ByteDance and TikTok, but their silence speaks …

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak Read More »

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely

🚨 Alert for HackingBlogs Readers! 🚨 Hello there to people who landed here. Today we’ll covering specific detail about SuperCardX a latest Malware-as-a-Service (MaaS) for NFC relay fraud that runs on Android. This software, which Cleafy Labs discovered, allows hackers to do contactless payments without physically touching the victim’s card. This is an essential read …

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely Read More »

Inside the Lexipol Leaks: What Police Don’t Want You to See About Force, Bodycams, and Whistleblowers

TL;DR : Recent document leaks have shown Lexipol’s significant influence on public safety policy once again. Critics say that certain of its policies promote unethical behavior, such as excessive force and racial profiling. In one well-known instance, a regulation written by Lexipol was used as justification for shutting off a body camera during the 2019 …

Inside the Lexipol Leaks: What Police Don’t Want You to See About Force, Bodycams, and Whistleblowers Read More »

Shocking Discovery: Samsung Phones Exposed to Major Security Vulnerabilities!

“Samsung Phones Are Secretly Saving Your Passwords in Plain Text — And No One’s Talking About It“ I suppose the amount of screenshots and testimony we have seen makes it very clear how serious this vulnerability is. We are discussing a significant problem today that affects millions of Samsung users: the clipboard’s ability to save …

Shocking Discovery: Samsung Phones Exposed to Major Security Vulnerabilities! Read More »

Fake WhatsApp & Telegram Preinstalled on Chinese Android Phones: Millions Lost to Crypto-Stealing Malware

Hello my dear HackingBlogs hackers,Every reader should pay close attention to this news since it is serious. Preinstalled on low-cost Chinese Android phones are fake Telegram and WhatsApp apps that are infected with spyware that steals cryptocurrency. These trojanized programs can even scan photos for wallet seed phrases, spoof update links, and steal clipboard data. …

Fake WhatsApp & Telegram Preinstalled on Chinese Android Phones: Millions Lost to Crypto-Stealing Malware Read More »

The Famous 4Chan Was HACKED !! Source Code Is LEAKED

One of the most stunning events in 4chan’s turbulent history will be April 2025. Known for its controversial history and anything-goes mentality, the notorious anonymous imageboard was taken offline following what looks to be a large hack, potentially the most significant cyberattack in its two-decade existence. 4chan just got 4chan’d 🙂 4chan Goes Dark Downdetector and other outage tracking sites were inundated with complaints from thousands of users who started claiming that 4chan was unavailable early on Tuesday. …

The Famous 4Chan Was HACKED !! Source Code Is LEAKED Read More »

Scroll to Top