WeSearch
Hub / Tags / Exploitation
TAG · #EXPLOITATION

Exploitation coverage.

Every story in the WeSearch catalog tagged with #exploitation, chronological, with view counts. Subscribe to the per-tag RSS feed to follow this topic in your reader of choice.

13 stories tagged with #exploitation, in publish-time order across the WeSearch catalog. Tag pages update as new stories ingest.

⌘ RSS feed for this tag →   or   search "Exploitation"

RELATED TAGS
#sexual-exploitation3#cybercrime3#cybersecurity2#child-sexual-abuse-material1#japan-police1#international-crackdown1#minor-offenders1#school-related-exploitation1#unix1#privilege-escalation1#post-exploitation1#system-tools1
HACKER NEWS (NEWEST)

Active exploitation of cPanel/WHM critical vulnerability

3 views ·
THE HINDU — TOP

Man arrested for exploiting, blackmailing multiple women with private pictures

Bengaluru man arrested for blackmailing multiple women with private photos after exploiting their trust and relationships.…

8 views ·
#blackmail#cybercrime#sexual exploitation
THE HINDU — TOP

Labour rights yet to be fully realised, says S.K. Kanta

S.K. Kanta emphasizes ongoing exploitation of workers despite legal protections, urging unity for labor rights and dignity at May Day event.…

4 views ·
#labour rights#workers' welfare
THE INDEPENDENT

Former Tory councillor convicted of drugging and raping wife for years admits making indecent images of children

Philip Young earlier pleaded guilty to drugging and assaulting his wife over a period of 13 years…

5 views ·
#crime#sexual assault#domestic abuse
TECHRADAR

AI tools have made vulnerability exploitation faster and easier

Old risk models assume attackers need skill and time — AI has eliminated both…

5 views ·
#cybersecurity#ai threats#vulnerability management
LE MONDE (EN)

In Chapeco, Brazil's 'slaughterhouse capital,' workers under pressure: 'The companies want us to be robots'

8 views ·
#labor rights#brazil#meat industry
GITHUB

Seg – One-command binary recon for CTFs and AI agents (Rust)

Analyze binaries and generate structured reports for AI agents and security research. - pwnwriter/seg…

7 views ·
#cybersecurity#binary analysis#ctf
WIRED

These Men Allegedly Profit Off Teaching People How to Make AI Porn

Three Arizona women have filed a lawsuit against a group of men that alleges they used the women’s photos to make AI porn influencers, then offered online courses showing others ho…

8 views ·
#ai ethics#online privacy#cybercrime
THE REGISTER

30 ClawHub skills secretly turn AI agents into a crypto swarm

Yet another reason not to feast on OpenClaw Thirty ClawHub skills published by a single author are silently co-opting AI agents and creating a mass cryptocurrency mining swarm – wi…

29 views ·
#ai security#crypto mining#openclaw
LE MONDE (EN)

France probes return of adult website linked to mass rape and child abuse

19 views ·
#cybercrime#child abuse#online exploitation
HINDUSTAN TIMES — TOP

‘Nida Khan taught how to offer namaz, wear hijab’: Fresh allegations emerge in TCS Nashik case

The bench of additional sessions judge K G Joshi reserved its order of anticipatory bail plea of Nida Khan on Monday.| India News…

5 views ·
#tcs nashik case#religious coercion#sexual exploitation
GTFOBINS

GTFOBins

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.…

5 views ·
#cybersecurity#unix#privilege escalation
JAPAN TIMES

99 accused in Japan in international crackdown on child sexual abuse material

Of the 99 people, 25 are junior high school and high school students involved in cases including sharing explicit images of classmates with friends.…

7 views ·
#child sexual abuse material#japan police#international crackdown