Category: ExploitOne

This deepfake video of Elon Musk can fool anyone into crypto scam
02
Mar
2023

This deepfake video of Elon Musk can fool anyone into crypto scam

Swindlers behind the latest malicious effort are duping victims by creating deepfaked versions of photographs and videos purporting to show…

Satellite broadcasting company DISH gets hacked by ransomware
02
Mar
2023

Satellite broadcasting company DISH gets hacked by ransomware

The global leader in satellite broadcasting, DISH, reported on Tuesday to the Securities and Exchange Commission (SEC) that a ransomware…

New research shows how easy is to hack any T-Mobile customer phone
28
Feb
2023

New research shows how easy is to hack any T-Mobile customer phone

New evidence reveals that over the year 2022, three distinct cybercriminal organizations gained access to the internal networks of the…

Government agencies in North America & Asia-Pacific become victim of new malware: PureCrypter
27
Feb
2023

Government agencies in North America & Asia-Pacific become victim of new malware: PureCrypter

The infrastructure for a hacking effort that exploited Microsoft OneNote files to distribute malware was shared with a previous campaign…

GTA online Rockstar Games Social Club accounts become victim of hackers again
27
Feb
2023

GTA online Rockstar Games Social Club accounts become victim of hackers again

On February 27, 2023, a Twitter user named MCbcMC2005 (Twitter/MCbcMC2005) tweeted that the Two-Factor Authentication exploits in Grand Theft Auto…

Critical AMD Ryzen Master vulnerability allows overclocking, overheating and wiping out AMD laptops
20
Feb
2023

Critical AMD Ryzen Master vulnerability allows overclocking, overheating and wiping out AMD laptops

AMD has disclosed that there is a high-severity vulnerability in the Ryzen Master software, which may potentially enable an adversary…

7 Critical vulnerabilities in SolarWinds Platform
17
Feb
2023

7 Critical vulnerabilities in SolarWinds Platform

This week, SolarWinds released three warnings that detailed high-severity vulnerabilities that are anticipated to be corrected with an upgrade to…

Critical flaws allows to escalate privileges or break Argo CD functionality
17
Feb
2023

Critical flaws allows to escalate privileges or break Argo CD functionality

Argo CD is a well-known open-source GitOps continuous delivery solution for Kubernetes. It is used to monitor operating applications and…

This OpenSSL vulnerability allows to read memory contents or launch DoS attack
08
Feb
2023

This OpenSSL vulnerability allows to read memory contents or launch DoS attack

On Tuesday, the OpenSSL Project released a significant security update in order to address at least eight identified security weaknesses….

This exploit code allows to hack into Linux servers(5.5 up to 6.2) easily
04
Feb
2023

This exploit code allows to hack into Linux servers(5.5 up to 6.2) easily

The Linux kernel has a framework known as netfilter that enables a variety of networking-related actions to be performed in…

Story of "A Most Dangerous Employee Any Company Can Have"
03
Feb
2023

Story of “A Most Dangerous Employee Any Company Can Have”

Ubiquiti Networks, a technological company that had its headquarters in New York, that produced and marketed equipment related to wireless…

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?
01
Feb
2023

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?

Certification in cybersecurity is often required for employment in the cybersecurity sector, and common examples of such certifications include those…