Category: ExploitOne

Ransomware shuts down 3 big manufacturing plants in France, Germany and Tunisia
17
May
2023

Ransomware shuts down 3 big manufacturing plants in France, Germany and Tunisia

Lacroix develops and manufactures electronic equipment for the automotive, home automation, aerospace, industrial, and healthcare industries. Lacroix also creates and…

Reset password of existing user of a wordpress site via hacking this famous elementor plugin
15
May
2023

Reset password of existing user of a wordpress site via hacking this famous elementor plugin

Essential Addons for Elementor, one of the most popular plugins for WordPress’s Elementor editor, has been found to have a…

Hacking into a company network now becomes easier with this Foxit PDF Reader vulnerability
12
May
2023

Hacking into a company network now becomes easier with this Foxit PDF Reader vulnerability

A significant vulnerability has been discovered in Foxit PDF Reader, a well-liked alternative to the PDF software developed by Adobe….

This phishing as a services allows sending emails that can hack MFA authentication
12
May
2023

This phishing as a services allows sending emails that can hack MFA authentication

Researchers from Cisco Talos have uncovered a novel and very sophisticated phishing-as-a-service (PaaS) offering, which they have given the name…

New dangerous ransomware encrypts itself and uses VPN flaws to encrypt network devices
10
May
2023

New dangerous ransomware encrypts itself and uses VPN flaws to encrypt network devices

Researchers in the field of information security have found a new strain of ransomware that has been given the name…

Vulnerability make it easier to hack Apache bRPC environments
09
May
2023

Vulnerability make it easier to hack Apache bRPC environments

Apache bRPC is a C++-based industrial-grade RPC framework, and it has lately come under criticism as a result of a…

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges
05
May
2023

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges

A recent vulnerability in the OverlayFS subsystem of the Linux kernel has been found as CVE-2023-0386, with a CVSS score…

New undetectable ransomware technique uses WinRar software to encrypt and wipe data
04
May
2023

New undetectable ransomware technique uses WinRar software to encrypt and wipe data

The Ukrainian Government Computer Emergency Response Team (CERT-UA) has released a new alert in which it states that Russian hackers…

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account
02
May
2023

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account

T-Mobile USA has started alerting customers whose personal information and account data may have been exposed as a consequence of…

How Hacker stole $300K in bitcoins from Russian government wallet & donate them to Ukraine
01
May
2023

How Hacker stole $300K in bitcoins from Russian government wallet & donate them to Ukraine

In the mostly uncontrolled realm of cryptocurrencies, hacking must not be a relatively rare occurrence, right? Hackers have been successful in…

How to protect confidential files in Linux with encryption
28
Apr
2023

How to protect confidential files in Linux with encryption

Both protecting your privacy and keeping your safety are now of the utmost importance. It is not simply the responsibility…

These 38 games similar to Minecraft that you should never play if you don't want to get hack
28
Apr
2023

These 38 games similar to Minecraft that you should never play if you don’t want to get hack

Minecraft is a well-known video game that may be enjoyed either on a personal computer or on a mobile device….