Category: ExploitOne

New Darkweb marketplace STYX, for any kind of financial fraud can replace Genesis market
07
Apr
2023

New Darkweb marketplace STYX, for any kind of financial fraud can replace Genesis market

It was only recently revealed that the well-known Dark Web marketplace Genesis’s Clearnet site was taken over by authorities. Now,…

Fastest encryption and most dangerous ransomware of the history
06
Apr
2023

Fastest encryption and most dangerous ransomware of the history

Researchers at the Israeli cybersecurity firm Check Point have given the new ransomware the name “Rorschach.” They said that their…

Hacking Nexx smart garage door controllers makes it easy for burglars to break into houses
05
Apr
2023

Hacking Nexx smart garage door controllers makes it easy for burglars to break into houses

Due to a number of security flaws that a certain type of smart garage door opener controllers, named Nexx, has,…

2842 top penetration testing & hacking tools added in new version of BlackArch Distro
03
Apr
2023

2842 top penetration testing & hacking tools added in new version of BlackArch Distro

When it comes to Linux distributions, we have access to a large number of different alternatives to choose from. BlackArch…

Famous 3 Hacking and Fake News Generation Tools Used by the Russian Military
01
Apr
2023

Famous 3 Hacking and Fake News Generation Tools Used by the Russian Military

Large-scale preparations by Russian military and intelligence services to use their cyberwar capabilities in misinformation campaigns, hacking operations, critical infrastructure…

How a simple bing.com vulnerability allowed hacking millions of enterpise Microsoft 365 accounts?
31
Mar
2023

How a simple bing.com vulnerability allowed hacking millions of enterpise Microsoft 365 accounts?

A vulnerability that might compromise the security of millions of Microsoft 365 accounts was found earlier this year. Researchers at…

New linux rootkit "Mélofée" can give forever control of servers to chinese hackers
30
Mar
2023

New linux rootkit “Mélofée” can give forever control of servers to chinese hackers

The malware was given the name Mélofée by the French cybersecurity company ExaTrack after they discovered three instances of the…

AI helps in fraud, theft, hacking, terrorism and sexual abuse
29
Mar
2023

AI helps in fraud, theft, hacking, terrorism and sexual abuse

In just a few short months, ChatGPT has established itself as an indispensable resource for millions of users. This artificial…

These Samsung Galaxy phones can be hacked just via incoming call. Update software
28
Mar
2023

These Samsung Galaxy phones can be hacked just via incoming call. Update software

A few days ago, we informed you that a significant flaw was present in a number of Samsung phones, which…

One of the biggest data breaches in Australian history
28
Mar
2023

One of the biggest data breaches in Australian history

An Australian non-bank lender by the name of Latitude Financial has disclosed that a cyber intrusion that occurred earlier this…

ChatGPT could not find vulnerabilities in its own system. How vulnerabilities allowed user account takeover and leaked payment data
25
Mar
2023

ChatGPT could not find vulnerabilities in its own system. How vulnerabilities allowed user account takeover and leaked payment data

An flaw in an open-source library was the cause of an outage that occurred earlier this week for the ChatGPT…

Researchers discover a new technique to hack and bypass Okta authentication
24
Mar
2023

Researchers discover a new technique to hack and bypass Okta authentication

Researchers have discovered a new possible post-exploitation attack mechanism in Okta that allows attackers to access users’ passwords and credentials…