https://www.exploit-db.com/
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
penetration testersexploit
https://hackread.com/hackers-downgrade-windows-exploit-patched-flaws/
New Attack Lets Hackers Downgrade Windows to Exploit Patched Flaws – Hackread –...
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
attack lets hackersnewwindows
Sponsored https://www.secrets.ai/
Secrets AI - #1 Realistic AI Girlfriend Website for Chatting
Chat 24/7 with realistic AI Girlfriend and enjoy 100+ Fantasies. Secrets AI is the best AI girlfriend website for mutual fun & personal AI companion bonding....
https://hackread.com/russian-hackers-firefox-windows-0-days-backdoor/
Russian Hackers Exploit Firefox and Windows 0-Days to Deploy Backdoor – Hackread –...
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
russian hackersexploitfirefox
https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/
Hackers exploit Modular DS WordPress plugin flaw for admin access
Hackers are actively exploiting a maximum severity flaw in the Modular DS WordPress plugin that allows them to bypass authentication remotely and access the...
hackers exploitmodular dsflaw
https://hothardware.com/news/amd-epyc-processors-found-vulnerable-to-cachewarp
EPYC CacheWarp CPU Exploit Gives Hackers Root Access To Virtual Machines, Patch Now | HotHardware
Nov 15, 2023 - The vulnerability only affects 1st, 2nd, and 3rd gen EPYC processors but everyone should update their microcode.
root accessepyccachewarpcpu
https://www.bleepingcomputer.com/news/security/unpatched-gogs-zero-day-rce-flaw-actively-exploited-in-attacks/
Hackers exploit unpatched Gogs zero-day to breach 700 servers
An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing...
hackers exploitzero daygogs
https://therecord.media/hackers-blender-software-malware
Hackers exploit 3D design software to target game developers, animators | The Record from Recorded...
Nov 26, 2025 - Russia-linked hackers are exploiting 3D design tools to infect animators, game developers and visual effects studios with information-stealing malware,...
hackers exploitdesignsoftware
https://www.csoonline.com/article/4110419/hackers-exploit-microsoft-oauth-device-codes-to-hijack-enterprise-accounts.html
Hackers exploit Microsoft OAuth device codes to hijack enterprise accounts | CSO Online
Dec 22, 2025 - Proofpoint has warned about phishing campaigns abusing legitimate device authorization flow to bypass MFA and gain persistent access.
hackers exploitmicrosoftoauth
https://www.infosecurity-magazine.com/news/hackers-exploit-aws/
Hackers Exploit Misconfigurations in Public Websites With Improperly E - Infosecurity Magazine
Nov 5, 2025 - Hackers exploited AWS misconfigurations, leaking 2TB of sensitive data, including customer information, credentials and proprietary source code
hackers exploitpublicwebsites
https://www.ilounge.com/news/hackers-can-exploit-silicon-vulnerability-for-encryption-keys
Hackers can exploit silicon vulnerability for encryption keys | iLounge
Mar 24, 2024 - A new vulnerability within the M-series Apple chips allows hackers to obtain encryption keys, as per an ArsTechnica-submitted academic research paper. The ...
encryption keyshackersexploit
https://www.virtru.com/blog/cybersecurity/social-engineering
6 Behaviors that Hackers Exploit in Social Engineering Attacks
Your cybersecurity behaviors have a big impact, whether you're a CEO or a new hire. Here are the red flags to watch out for in a social engineering attack.
hackers exploitbehaviors
https://www.cybersecuritydive.com/news/cisco-china-cyberattacks-asyncos-configuration/808258/
China-linked hackers exploit insecure setting in Cisco security products | Cybersecurity Dive
The company urged customers to immediately reconfigure affected products.
china linked hackersexploit
Sponsored https://www.sexyfans.app/
Sexyfans.app - Only Fans of Dating Apps Welcome
The Only Dating App for Fans to Meetup with Local Content Creators..
https://www.csoonline.com/article/4043721/russian-hackers-exploit-old-cisco-flaw-to-target-global-enterprise-networks.html
Russian hackers exploit old Cisco flaw to target global enterprise networks | CSO Online
Aug 22, 2025 - FBI and Cisco Talos warn of a sophisticated Russian FSB unit threatening enterprise network infrastructure and business continuity across critical sectors.
russian hackerscisco flawold
https://www.firstpost.com/web-show/firstpost-america/china-linked-hackers-exploit-venezuela-crisis-to-target-us-officials-firstpost-america-n18g--vd1764357/
China-Linked Hackers Exploit Venezuela Crisis To Target US Officials | Firstpost America | N18G
china linked hackersexploitus
https://cointelegraph.com/explained/typosquatting-in-crypto-explained-how-hackers-exploit-small-mistakes
Typosquatting in crypto, explained: How hackers exploit small mistakes
Discover how typosquatting in cryptocurrency exploits user errors, leading to financial losses and security risks.
crypto explainedtyposquatting
Sponsored https://www.naughtycharm.com/
NaughtyCharm
https://www.vice.com/en/article/hackers-selling-critical-zoom-zero-day-exploit-for-500000/
Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000
Jul 27, 2024 - People who trade in zero-day exploits say there are two Zoom zero-days, one for Windows and one for MacOS, on the market.
zero dayhackerssellingzoom