Cybersecurity roundup: ShareFile RCE, Android rootkit, ImageMagick 0-days, XLoader, phishing, and supply chain threats.
Exploit Security
Computer and Network Security
Curiosity Drives Our Very Fabric | Penetration Testing | Security Research
About us
Penetration Testing and Security Research, specialising in IoT, Hardware Hacking, Physical Security and Embedded Systems.
- Website
-
https://www.exploitsecurity.io/
External link for Exploit Security
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Sydney
- Type
- Privately Held
- Specialties
- IOT, Security Research, Penetration Testing, and Hardware CTF
Locations
-
Primary
Get directions
Sydney, AU
-
Get directions
24 MacDonald St
Ramsgate, New South Wales 2217, AU
Employees at Exploit Security
Updates
-
Automated scans are useful, but they’re not the full story, we regularly find issues that only expert, manual testing uncovers. As white‑hat freelancers with embedded/IoT expertise and a track record of zero‑day discovery, we deliver thorough penetration tests that cover firmware, radio interfaces and business logic, not just network ports. The result: more accurate risk prioritisation, targeted remediation plans your ops teams can action, and a stronger compliance posture for Sydney organisations. Learn how our approach closes gaps automated tools miss, visit us at https://exploitsecurity.io 🔍 How are you prioritising pentest scope this year? Share a challenge and we’ll weigh in. #CyberSecurity #PenTesting #Compliance
-
-
⚡ Malicious Outlook add-in steals 4,000+ Microsoft credentials via fake login pages. 🕵️ 300,000+ users hit by fake Chrome AI extensions harvesting emails and browser data. 💸→📉 BridgePay ransomware forces businesses onto cash-only ops. 📁→🌐 LexisNexis breached via unpatched Reach2Shell (CVSS 10). 👻 Healthcare still taking heavy ransomware fire. The future isn't coming. It's already resident in your extensions. Exploit Security, Feb 26-Mar 4 raw feed just dropped. Lock it down before the next silent harvest. 🔒 #ExploitSecurity #WeeklyNewsLetter #ExploitDigest
-
We’ve found that proactive vulnerability research delivers measurable ROI for organisations in Sydney. Ongoing research, beyond isolated penetration tests, uncovers systemic weaknesses in embedded platforms and bespoke integrations, including zero-day issues our reports document. By measuring time-to-fix and tracking repeat incidents, we demonstrate how continuous engagement reduces future incident costs and simplifies compliance, particularly for businesses with specialised hardware or legacy IoT devices. Visit us at https://exploitsecurity.io What’s the biggest compliance or device challenge your team is facing right now? Let’s discuss. #CyberSecurity #RiskManagement #Sydney
-
-
We help Sydney organisations bridge PCI DSS gaps introduced by embedded and IoT-enabled payment systems. Many audits assume traditional card‑holder data environments, but firmware flaws, unmanaged IoT endpoints and insecure update channels can undermine PCI controls and leave compliance evidence incomplete. Our combined approach, targeted penetration testing of firmware, device interfaces and network segmentation plus tailored remediation reports, produces clear, audit‑ready evidence that procurement and compliance teams can rely on. We document findings, risk impact and verified fixes so auditors see both the vulnerability and the mitigation. We’ve worked hands‑on across retail and payment environments to convert technical test results into tangible compliance outcomes. Learn how we can support your PCI program in Sydney: https://exploitsecurity.io 🔒 #CyberSecurity #PCIDSS #IoTSecurity
-
-
💥 Let us Exploit your Security so that the bad guys don't get a chance to ❌ Don't know where to start, when it comes to securing your digital footprint ? Talk with one of our consultants now, we will take the time to understand the problem to provide a tailored solution... Penetration Testing ... PCI compliance ... Cyber Security Tabletop Exercise ... Let our curiosity drive you as it does our team !!! #ExploitSecurity #PenetrationTesting #TabletopExercise #PCIComplianceServices #CuriosityDrivesOurVeryFabric
-
At Exploit Security we trace critical IoT vulnerabilities from noisy telemetry to full root on devices, demonstrating why embedded security cannot be an afterthought. Using firmware extraction, JTAG-assisted debugging and protocol fuzzing, we map persistent backdoors that evade surface scans and standard vulnerability scanners. Our team validates zero‑day exploit chains, reproduce data exfiltration scenarios, and assessed supply‑chain impact, findings that extend remediation timelines from days to weeks once hardware root cause is considered. For Sydney organisations operating IoT fleets, this means real risk: customer data leakage, downstream vendor compromise, and costly patch orchestration. If your security program relies on network-only checks, we should talk about targeted firmware analysis, hardware-assisted testing and tailored remediation plans. Learn more about our approach and results: https://wix.to/FrrKSRX 🔍🔧 #IoTSecurity #EmbeddedSystems #CyberRisk
-