Category: ExploitOne

Hack into any linux machine exploiting this bluetooth subsystem vulnerability
18
Apr
2023

Hack into any linux machine exploiting this bluetooth subsystem vulnerability

Within the Linux kernel, a security flaw that has been given the identifier CVE-2023-2002 has been discovered; this flaw poses…

Famous hacker claims that Australians are "the stupidest humans alive" and the easiest to hack
18
Apr
2023

Famous hacker claims that Australians are “the stupidest humans alive” and the easiest to hack

As he reveals how cyber gangs attack people and organizations with no guilt, a hacker believes that Australians are the…

Ten indicators that someone is spying and tracking your Android or iPhone
14
Apr
2023

Ten indicators that someone is spying and tracking your Android or iPhone

Over the last two decades, the digital revolution has done nothing less than significantly improve the accessibility of information and…

Easily escalate privileges using these two flaws to take control of Linux devices
12
Apr
2023

Easily escalate privileges using these two flaws to take control of Linux devices

CVE-2023-1281 and CVE-2023-1829 are two serious vulnerabilities that have been discovered in the Linux kernel. Both vulnerabilities have the potential…

97 vulnerabilities, including 3 zero-days, finally patched in the April Windows Update
11
Apr
2023

97 vulnerabilities, including 3 zero-days, finally patched in the April Windows Update

Patch Tuesday for the month of April 2023 has here, and with it comes a torrent of new security updates…

Hackers find new way to hack into YouTube accounts & nobody undertands how its possible
11
Apr
2023

Hackers find new way to hack into YouTube accounts & nobody undertands how its possible

A few days ago, we told you about the development of a YouTube scam that had everything: cryptocurrency fraud, the…

New Darkweb marketplace STYX, for any kind of financial fraud can replace Genesis market
07
Apr
2023

New Darkweb marketplace STYX, for any kind of financial fraud can replace Genesis market

It was only recently revealed that the well-known Dark Web marketplace Genesis’s Clearnet site was taken over by authorities. Now,…

Fastest encryption and most dangerous ransomware of the history
06
Apr
2023

Fastest encryption and most dangerous ransomware of the history

Researchers at the Israeli cybersecurity firm Check Point have given the new ransomware the name “Rorschach.” They said that their…

Hacking Nexx smart garage door controllers makes it easy for burglars to break into houses
05
Apr
2023

Hacking Nexx smart garage door controllers makes it easy for burglars to break into houses

Due to a number of security flaws that a certain type of smart garage door opener controllers, named Nexx, has,…

2842 top penetration testing & hacking tools added in new version of BlackArch Distro
03
Apr
2023

2842 top penetration testing & hacking tools added in new version of BlackArch Distro

When it comes to Linux distributions, we have access to a large number of different alternatives to choose from. BlackArch…

Famous 3 Hacking and Fake News Generation Tools Used by the Russian Military
01
Apr
2023

Famous 3 Hacking and Fake News Generation Tools Used by the Russian Military

Large-scale preparations by Russian military and intelligence services to use their cyberwar capabilities in misinformation campaigns, hacking operations, critical infrastructure…

How a simple bing.com vulnerability allowed hacking millions of enterpise Microsoft 365 accounts?
31
Mar
2023

How a simple bing.com vulnerability allowed hacking millions of enterpise Microsoft 365 accounts?

A vulnerability that might compromise the security of millions of Microsoft 365 accounts was found earlier this year. Researchers at…