Category: ExploitOne
The malware was given the name Mélofée by the French cybersecurity company ExaTrack after they discovered three instances of the…
In just a few short months, ChatGPT has established itself as an indispensable resource for millions of users. This artificial…
A few days ago, we informed you that a significant flaw was present in a number of Samsung phones, which…
An Australian non-bank lender by the name of Latitude Financial has disclosed that a cyber intrusion that occurred earlier this…
An flaw in an open-source library was the cause of an outage that occurred earlier this week for the ChatGPT…
Researchers have discovered a new possible post-exploitation attack mechanism in Okta that allows attackers to access users’ passwords and credentials…
Spring is a widely popular application framework that gives software developers the ability to rapidly and simply construct Java applications…
Ferrari has admitted to being the victim of a data hack and an extortion demand. The threat actors may have…
Hitachi Energy, a division of the Japanese multinational engineering and technology corporation Hitachi, has acknowledged a data breach, which occurred…
A new decryption tool that aids victims of a ransomware version that was based on previously released Conti source code has…
The video chat company Zoom has issued updates for various security flaws that leave users of Windows and macOS vulnerable…
The ALPHV ransomware organization is responsible for a string of ransomware operations that have been carried out via the BlackCat…