Category: ExploitOne
Spring is a widely popular application framework that gives software developers the ability to rapidly and simply construct Java applications…
Ferrari has admitted to being the victim of a data hack and an extortion demand. The threat actors may have…
Hitachi Energy, a division of the Japanese multinational engineering and technology corporation Hitachi, has acknowledged a data breach, which occurred…
A new decryption tool that aids victims of a ransomware version that was based on previously released Conti source code has…
The video chat company Zoom has issued updates for various security flaws that leave users of Windows and macOS vulnerable…
The ALPHV ransomware organization is responsible for a string of ransomware operations that have been carried out via the BlackCat…
The first problem is a high-severity vulnerability in Plex Media Server that has been tracked as CVE-2020-5741 and is defined…
AT&T, the largest provider of mobile phone services in the United States, is in the process of alerting millions of…
Eaton Zveare, a hobbyist white hat hacker located in Sarasota, Florida, gained access to the C360 customer relationship management online…
There have been efforts made to exploit CVE-2022-31678 and CVE-2021-39144 in the wild, as discovered by the Wallarm Detect team….
ATMs provide a high level of convenience; yet, they have also been a traditional target for robbers. Some people will…
A website that lets users purchase and trade firearms was hacked, and as a result, the names of the website’s…