Recent discoveries reveal critical vulnerabilities in Eken and Tuck's doorbell cameras, leading to unauthorized access and resulting in some retailers offering refunds and discontinuing sales. Additionally, cybersecurity specialists have identified unconventional breach methods used by Red Teams and criminals, such as USB drops, mailed compromised devices, attacks on port authorities, drone-based strategies, insider schemes, and exploiting weak drivers for initial access. The 6th Edition of the Hacker Powered Security Report also sheds light on modern penetration testing, comparing traditional Penetration Testing as a Service (PTaaS) with automated approaches, focusing on their efficiency, quality, and overall worth.