Author name: Dipanshu Kumar

Linux Kernel Hacked: CVE-2025-21756 – Exploiting the Vsock UAF for Root Access

Executive Summary : The Linux kernel’s Vsock subsystem has a privilege escalation vulnerability known as CVE-2025-21756. It is brought on by an incorrect reference count decrease in the vsock_remove_sock function, which results in a Use After Free (UAF) condition. An attacker may cause a memory corruption by taking advantage of this UAF, which would enable […]

Linux Kernel Hacked: CVE-2025-21756 – Exploiting the Vsock UAF for Root Access Read More »

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models

Hey hackers, were you aware that a significant zero-day attack recently affected Viasat’s satellite modems? A serious flaw in these devices, which are essential for satellite internet, could allow attackers to run remote code without authentication. Read on to learn how this attack operates and why it is important it will change the face of

Critical Zero-Day Vulnerability Exposes Viasat Satellite Modems to Remote Code Execution: CVE-2024-6198 Uncovered in Multiple Models Read More »

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal

“The Indian Cyber Force strikes back after the Pahalgam attack, breaching Pakistan’s largest bank, HBL!” Hello My Dear Users Of HackingBlogs,Today We’ll be looking at the recent cyber strike made my the Indian Cyber Force. Who Are They, what data has been exposed what are it’s after cause and analysis of the data exposed. So

Indian Cyber Force Breaches Pakistan’s Largest Bank, HBL, Exposing Employee Portal Read More »

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files

Hello HackingBlogs Users 🙂 Due to a recent error by Microsoft Defender, users of the malware analysis tool ANY.RUN unintentionally put private company files online, resulting in an unexpected flood of data exposure. Free-plan customers hurried to examine suspicious documents after a false positive flagged Adobe’s authentic Acrobat Cloud links as dangerous, not understanding their

Microsoft Defender Error Triggers Data Leak: ANY.RUN Users Unknowingly Expose Sensitive Corporate Files Read More »

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI)

Summary: Policy Puppetry, a universal and flexible prompt injection technique developed by researchers at HiddenLayer, bypasses safety features in large language models (LLMs) in all of the major AI systems. Attackers can create dangerous content, including instructions for making deadly chemicals, encouraging violence, self-harm, and extracting system prompts, by using this technique to get over

ChatGPT, Gemini, DeepSeek, Copilot, and Other Major AI Models Affected by Policy Puppetry Prompt Injection (PPPI) Read More »

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak

After claiming to have infiltrated TikTok and obtained the passwords of 972,528 users, the group of hackers R00TK1T ISC CYBER TEAM has caused controversy. The group claims that after initially alerting TikTok and not receiving a response, they started leaking the data in revenge. We are R00TK1T, warned ByteDance and TikTok, but their silence speaks

TikTok Hacked? 972,528 Passwords at Risk in Alleged Data Leak Read More »

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely

🚨 Alert for HackingBlogs Readers! 🚨 Hello there to people who landed here. Today we’ll covering specific detail about SuperCardX a latest Malware-as-a-Service (MaaS) for NFC relay fraud that runs on Android. This software, which Cleafy Labs discovered, allows hackers to do contactless payments without physically touching the victim’s card. This is an essential read

No Tap, No Swipe : 2025’s Most Dangerous Android Malware? SuperCard X Is Stealing Cards Remotely Read More »

Inside the Lexipol Leaks: What Police Don’t Want You to See About Force, Bodycams, and Whistleblowers

TL;DR : Recent document leaks have shown Lexipol’s significant influence on public safety policy once again. Critics say that certain of its policies promote unethical behavior, such as excessive force and racial profiling. In one well-known instance, a regulation written by Lexipol was used as justification for shutting off a body camera during the 2019

Inside the Lexipol Leaks: What Police Don’t Want You to See About Force, Bodycams, and Whistleblowers Read More »

Shocking Discovery: Samsung Phones Exposed to Major Security Vulnerabilities!

“Samsung Phones Are Secretly Saving Your Passwords in Plain Text — And No One’s Talking About It“ I suppose the amount of screenshots and testimony we have seen makes it very clear how serious this vulnerability is. We are discussing a significant problem today that affects millions of Samsung users: the clipboard’s ability to save

Shocking Discovery: Samsung Phones Exposed to Major Security Vulnerabilities! Read More »

Fake WhatsApp & Telegram Preinstalled on Chinese Android Phones: Millions Lost to Crypto-Stealing Malware

Hello my dear HackingBlogs hackers,Every reader should pay close attention to this news since it is serious. Preinstalled on low-cost Chinese Android phones are fake Telegram and WhatsApp apps that are infected with spyware that steals cryptocurrency. These trojanized programs can even scan photos for wallet seed phrases, spoof update links, and steal clipboard data.

Fake WhatsApp & Telegram Preinstalled on Chinese Android Phones: Millions Lost to Crypto-Stealing Malware Read More »

Scroll to Top