Category: ExploitOne

Hacking PrestaShop based eCommerce websites using flaws with CVSS score of 9.9
27
Apr
2023

Hacking PrestaShop based eCommerce websites using flaws with CVSS score of 9.9

The fast-paced modern world has made online shopping and selling an essential component of our everyday life. PrestaShop has distinguished…

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks
26
Apr
2023

Abusing Service Location Protocol to cause never seen before 2,200x DDoS amplification attacks

Service Location Protocol (SLP) is an older Internet protocol that has been found to contain a critical security flaw, which…

Even if you use VPN or private browser mode, Google can still track you via Free Fonts
25
Apr
2023

Even if you use VPN or private browser mode, Google can still track you via Free Fonts

According to an article published by the Daily Mail, Google monitors the surfing activity of users on their devices by…

How to Hack Google Cloud(GCP) Accounts via Ghost Token technique?
22
Apr
2023

How to Hack Google Cloud(GCP) Accounts via Ghost Token technique?

The Security Research Group at Astrix discovered a zero-day vulnerability in Google’s Cloud Platform (GCP), which means that all Google…

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9
21
Apr
2023

Hacking Cisco Industrial Network Director (IND) router using vulnerabilities with CVSS score 9.9

Cisco Industrial Network Director (IND) is an important tool for managing industrial networks, particularly in settings that need high-security standards….

Delete these Andorid apps with 100 million installs before your bank accounts gets hacked
20
Apr
2023

Delete these Andorid apps with 100 million installs before your bank accounts gets hacked

The Mobile Research Team at McAfee came upon a software library that they have dubbed Goldoson. Goldoson compiles lists of…

Hack into any linux machine exploiting this bluetooth subsystem vulnerability
18
Apr
2023

Hack into any linux machine exploiting this bluetooth subsystem vulnerability

Within the Linux kernel, a security flaw that has been given the identifier CVE-2023-2002 has been discovered; this flaw poses…

Famous hacker claims that Australians are "the stupidest humans alive" and the easiest to hack
18
Apr
2023

Famous hacker claims that Australians are “the stupidest humans alive” and the easiest to hack

As he reveals how cyber gangs attack people and organizations with no guilt, a hacker believes that Australians are the…

Ten indicators that someone is spying and tracking your Android or iPhone
14
Apr
2023

Ten indicators that someone is spying and tracking your Android or iPhone

Over the last two decades, the digital revolution has done nothing less than significantly improve the accessibility of information and…

Easily escalate privileges using these two flaws to take control of Linux devices
12
Apr
2023

Easily escalate privileges using these two flaws to take control of Linux devices

CVE-2023-1281 and CVE-2023-1829 are two serious vulnerabilities that have been discovered in the Linux kernel. Both vulnerabilities have the potential…

97 vulnerabilities, including 3 zero-days, finally patched in the April Windows Update
11
Apr
2023

97 vulnerabilities, including 3 zero-days, finally patched in the April Windows Update

Patch Tuesday for the month of April 2023 has here, and with it comes a torrent of new security updates…

Hackers find new way to hack into YouTube accounts & nobody undertands how its possible
11
Apr
2023

Hackers find new way to hack into YouTube accounts & nobody undertands how its possible

A few days ago, we told you about the development of a YouTube scam that had everything: cryptocurrency fraud, the…