Category: ExploitOne

7 Critical vulnerabilities in SolarWinds Platform
17
Feb
2023

7 Critical vulnerabilities in SolarWinds Platform

This week, SolarWinds released three warnings that detailed high-severity vulnerabilities that are anticipated to be corrected with an upgrade to…

Critical flaws allows to escalate privileges or break Argo CD functionality
17
Feb
2023

Critical flaws allows to escalate privileges or break Argo CD functionality

Argo CD is a well-known open-source GitOps continuous delivery solution for Kubernetes. It is used to monitor operating applications and…

This OpenSSL vulnerability allows to read memory contents or launch DoS attack
08
Feb
2023

This OpenSSL vulnerability allows to read memory contents or launch DoS attack

On Tuesday, the OpenSSL Project released a significant security update in order to address at least eight identified security weaknesses….

This exploit code allows to hack into Linux servers(5.5 up to 6.2) easily
04
Feb
2023

This exploit code allows to hack into Linux servers(5.5 up to 6.2) easily

The Linux kernel has a framework known as netfilter that enables a variety of networking-related actions to be performed in…

Story of "A Most Dangerous Employee Any Company Can Have"
03
Feb
2023

Story of “A Most Dangerous Employee Any Company Can Have”

Ubiquiti Networks, a technological company that had its headquarters in New York, that produced and marketed equipment related to wireless…

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?
01
Feb
2023

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?

Certification in cybersecurity is often required for employment in the cybersecurity sector, and common examples of such certifications include those…

New phishing tactic exploits DocuSign documents
01
Feb
2023

New phishing tactic exploits DocuSign documents

Imagine that you get an email from DocuSign, which is a reputable and well-known electronic signature platform. If you clicked…

Exploit code allows attackers to read all KeePass saved passwords
31
Jan
2023

Exploit code allows attackers to read all KeePass saved passwords

KeePass is a widely used open-source password manager that enables you to manage your passwords by using a database that…

Hackers can now take over remotely Western Digital NAS storages. Critical flaws
27
Jan
2023

Hackers can now take over remotely Western Digital NAS storages. Critical flaws

My Cloud from Western Digital is one of the most popular network-attached storage (NAS) devices that are being used by…

Ex Yandex employee leaks source code of different Yandex services
26
Jan
2023

Ex Yandex employee leaks source code of different Yandex services

A Yandex source code repository that was apparently taken by an ex-worker of the Russian IT giant has been published…

Mexican tax agency SAT hack. Myth or Real?
26
Jan
2023

Mexican tax agency SAT hack. Myth or Real?

On Tuesday, January 24, many news organizations claimed that the SAT site had been hacked. In response to these reports,…

Yahoo has become the most impersonated brand in phishing attacks leaving behind DHL
25
Jan
2023

Yahoo has become the most impersonated brand in phishing attacks leaving behind DHL

During the fourth quarter of 2022, Yahoo was the target of twenty percent of all brand phishing attempts. Investigators discovered…