Category: ExploitOne

Hacking Fortinet's Fortigate firewalls to install a ransomware is quite possible
12
Jun
2023

Hacking Fortinet’s Fortigate firewalls to install a ransomware is quite possible

FortiOS is the operating system and firmware that powers Fortinet’s Fortigate firewalls and other devices. Fortinet has issued many versions…

Fan of Splunk SIEM? You should be worried as it can now be exploited to leak your company data
09
Jun
2023

Fan of Splunk SIEM? You should be worried as it can now be exploited to leak your company data

Splunk is one of the Security Incident and Event Management (SIEM) tools that is used the most all over the…

Its so easy to steal KIA and Hyundai cars with USB cable, that governments might ban them
08
Jun
2023

Its so easy to steal KIA and Hyundai cars with USB cable, that governments might ban them

The theft of Hyundai and Kia vehicles occurred 977 times in the first four months of the year 2023 in…

Now you can hack exploiting Cisco AnyConnect Secure Mobility Client Software 0-day flaw
08
Jun
2023

Now you can hack exploiting Cisco AnyConnect Secure Mobility Client Software 0-day flaw

An authenticated, local attacker may be able to cause a targeted AnyConnect user to execute a malicious script if a…

MOVEit software vulnerability allows installing ransomware and is not just sql injection
07
Jun
2023

MOVEit software vulnerability allows installing ransomware and is not just sql injection

Since last Thursday, security researchers have been sounding the alarm about a newly discovered flaw in the MOVEit Transfer solution…

Putin deepfake video showed on hacked Russian TV and radio stations
06
Jun
2023

Putin deepfake video showed on hacked Russian TV and radio stations

Dimitri Peskov, a spokesperson for the Kremlin, stated on Monday that a bogus speech by Russian President Vladimir Putin regarding…

Hacking Apple macOS devices exploiting the Migration Assistant
03
Jun
2023

Hacking Apple macOS devices exploiting the Migration Assistant

A vulnerability that was only recently found and given the name “Migraine” is connected to macOS migration functionality and represents…

Amazon Ring Camera should improve customer security, but does the opposite, confirms US government
01
Jun
2023

Amazon Ring Camera should improve customer security, but does the opposite, confirms US government

In order to resolve complaints about Alexa and its Ring home security service, Amazon has agreed to pay the Federal…

Hackers find new way to hack Discord admins via bookmarks and empty their crypto wallets
01
Jun
2023

Hackers find new way to hack Discord admins via bookmarks and empty their crypto wallets

This past month, a number of Discord groups that were centered on cryptocurrencies were compromised after the administrators of such…

478,000 RaidForums members data leaked to a new hacker forum
31
May
2023

478,000 RaidForums members data leaked to a new hacker forum

A database that formerly belonged to the cybercrime platform known as RaidForums but has since been shut down has been…

Hack infosec guys infected packet capture file exploiting flaws in the software Wireshark
26
May
2023

Hack infosec guys infected packet capture file exploiting flaws in the software Wireshark

Wireshark is a network packet analyzer that is both open-source and free, and it is used by people all over…

How to bypass Netflix password sharing ban?
25
May
2023

How to bypass Netflix password sharing ban?

Sorry, password zealots, but Netflix now recommends you change your password after implementing some controversial new rules. The well-known streaming…