Category: ExploitOne

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges
05
May
2023

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges

A recent vulnerability in the OverlayFS subsystem of the Linux kernel has been found as CVE-2023-0386, with a CVSS score…

New undetectable ransomware technique uses WinRar software to encrypt and wipe data
04
May
2023

New undetectable ransomware technique uses WinRar software to encrypt and wipe data

The Ukrainian Government Computer Emergency Response Team (CERT-UA) has released a new alert in which it states that Russian hackers…

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account
02
May
2023

How new T-Mobile hack, shows why you should never link T-Mobile number with bank account

T-Mobile USA has started alerting customers whose personal information and account data may have been exposed as a consequence of…

How Hacker stole $300K in bitcoins from Russian government wallet & donate them to Ukraine
01
May
2023

How Hacker stole $300K in bitcoins from Russian government wallet & donate them to Ukraine

In the mostly uncontrolled realm of cryptocurrencies, hacking must not be a relatively rare occurrence, right? Hackers have been successful in…

How to protect confidential files in Linux with encryption
28
Apr
2023

How to protect confidential files in Linux with encryption

Both protecting your privacy and keeping your safety are now of the utmost importance. It is not simply the responsibility…

These 38 games similar to Minecraft that you should never play if you don't want to get hack
28
Apr
2023

These 38 games similar to Minecraft that you should never play if you don’t want to get hack

Minecraft is a well-known video game that may be enjoyed either on a personal computer or on a mobile device….

Hacking PrestaShop based eCommerce websites using flaws with CVSS score of 9.9
27
Apr
2023

Hacking PrestaShop based eCommerce websites using flaws with CVSS score of 9.9

The fast-paced modern world has made online shopping and selling an essential component of our everyday life. PrestaShop has distinguished…

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks
26
Apr
2023

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks

Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…

Even if you use VPN or private browser mode, Google can still track you via Free Fonts
25
Apr
2023

Even if you use VPN or private browser mode, Google can still track you via Free Fonts

According to an article published by the Daily Mail, Google monitors the surfing activity of users on their devices by…

How to Hack Google Cloud(GCP) Accounts via Ghost Token technique?
22
Apr
2023

How to Hack Google Cloud(GCP) Accounts via Ghost Token technique?

The Security Research Group at Astrix discovered a zero-day vulnerability in Google’s Cloud Platform (GCP), which means that all Google…

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9
21
Apr
2023

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9

Cisco Industrial Network Director (IND) is an important tool for managing industrial networks, particularly in settings that need high-security standards….

Delete these Andorid apps with 100 million installs before your bank accounts gets hacked
20
Apr
2023

Delete these Andorid apps with 100 million installs before your bank accounts gets hacked

The Mobile Research Team at McAfee came upon a software library that they have dubbed Goldoson. Goldoson compiles lists of…