Category: ExploitOne

New linux rootkit "Mélofée" can give forever control of servers to chinese hackers
30
Mar
2023

New linux rootkit “Mélofée” can give forever control of servers to chinese hackers

The malware was given the name Mélofée by the French cybersecurity company ExaTrack after they discovered three instances of the…

AI helps in fraud, theft, hacking, terrorism and sexual abuse
29
Mar
2023

AI helps in fraud, theft, hacking, terrorism and sexual abuse

In just a few short months, ChatGPT has established itself as an indispensable resource for millions of users. This artificial…

These Samsung Galaxy phones can be hacked just via incoming call. Update software
28
Mar
2023

These Samsung Galaxy phones can be hacked just via incoming call. Update software

A few days ago, we informed you that a significant flaw was present in a number of Samsung phones, which…

One of the biggest data breaches in Australian history
28
Mar
2023

One of the biggest data breaches in Australian history

An Australian non-bank lender by the name of Latitude Financial has disclosed that a cyber intrusion that occurred earlier this…

ChatGPT could not find vulnerabilities in its own system. How vulnerabilities allowed user account takeover and leaked payment data
25
Mar
2023

ChatGPT could not find vulnerabilities in its own system. How vulnerabilities allowed user account takeover and leaked payment data

An flaw in an open-source library was the cause of an outage that occurred earlier this week for the ChatGPT…

Researchers discover a new technique to hack and bypass Okta authentication
24
Mar
2023

Researchers discover a new technique to hack and bypass Okta authentication

Researchers have discovered a new possible post-exploitation attack mechanism in Okta that allows attackers to access users’ passwords and credentials…

Two Spring Framework flaws put your java applications in great risk
22
Mar
2023

Two Spring Framework flaws put your java applications in great risk

Spring is a widely popular application framework that gives software developers the ability to rapidly and simply construct Java applications…

Hackers demanded $1 million from Ferrari for not leaking customers personal information
21
Mar
2023

Hackers demanded $1 million from Ferrari for not leaking customers personal information

Ferrari has admitted to being the victim of a data hack and an extortion demand. The threat actors may have…

Clop Ransomware hacks into Hitachi Energy corporation
18
Mar
2023

Clop Ransomware hacks into Hitachi Energy corporation

Hitachi Energy, a division of the Japanese multinational engineering and technology corporation Hitachi, has acknowledged a data breach, which occurred…

Freely decrypt Conti-based ransomware files with this new decryption tool
16
Mar
2023

Freely decrypt Conti-based ransomware files with this new decryption tool

A new decryption tool that aids victims of a ransomware version that was based on previously released Conti source code has…

Two high severity vulnerabilities in Zoom app
16
Mar
2023

Two high severity vulnerabilities in Zoom app

The video chat company Zoom has issued updates for various security flaws that leave users of Windows and macOS vulnerable…

ALPHV ransomware threatens to disclose data stolen from Amazon's Ring security cameras
15
Mar
2023

ALPHV ransomware threatens to disclose data stolen from Amazon’s Ring security cameras

The ALPHV ransomware organization is responsible for a string of ransomware operations that have been carried out via the BlackCat…