⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More

Some of the biggest security problems start quietly. No alerts. No warnings. Just small actions that seem normal but aren’t. Attackers now know how to stay hidden by blending in, and that makes it har …
Read more

Published Date:
Jun 16, 2025 (14 hours, 56 minutes ago)

Vulnerabilities has been mentioned in this article.

Read More

Langflow Under Attacks: CVE-2025-3248 Exploited to Deliver Stealthy Flodrix Botnet

Trend Micro has uncovered an active and sophisticated campaign exploiting a critical remote code execution (RCE) vulnerability in Langflow, a popular open-source framework for building AI applications …
Read more

Published Date:
Jun 16, 2025 (3 hours, 50 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2025-3248

Read More

Zyxel Firewalls Under Attack via Critical CVE-2023-28771

A sudden and coordinated wave of exploit attempts targeting a critical vulnerability in Zyxel firewalls has been detected. The attack centers around CVE-2023-28771, a high-severity remote code executi …
Read more

Published Date:
Jun 17, 2025 (2 hours, 16 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2023-33010

CVE-2023-33009

CVE-2023-28771

Read More

PoCGen: AI Tool Automates Exploit Generation for npm Vulnerabilities with LLMs

A tool named PoCGen is revolutionizing how the security community generates Proof-of-Concept (PoC) exploits for vulnerabilities in the npm ecosystem. Developed by researchers Deniz Simsek, Aryaz Eghba …
Read more

Published Date:
Jun 17, 2025 (2 hours, 13 minutes ago)

Vulnerabilities has been mentioned in this article.

CVE-2024-57063

CVE-2023-28771

Read More