Category: ExploitOne

Story of "A Most Dangerous Employee Any Company Can Have"
03
Feb
2023

Story of “A Most Dangerous Employee Any Company Can Have”

Ubiquiti Networks, a technological company that had its headquarters in New York, that produced and marketed equipment related to wireless…

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?
01
Feb
2023

Downloading SANS Course or passing a CISSP, CompTIA, ISC2 certification. How hackers are making it easy for cheaters?

Certification in cybersecurity is often required for employment in the cybersecurity sector, and common examples of such certifications include those…

New phishing tactic exploits DocuSign documents
01
Feb
2023

New phishing tactic exploits DocuSign documents

Imagine that you get an email from DocuSign, which is a reputable and well-known electronic signature platform. If you clicked…

Exploit code allows attackers to read all KeePass saved passwords
31
Jan
2023

Exploit code allows attackers to read all KeePass saved passwords

KeePass is a widely used open-source password manager that enables you to manage your passwords by using a database that…

Hackers can now take over remotely Western Digital NAS storages. Critical flaws
27
Jan
2023

Hackers can now take over remotely Western Digital NAS storages. Critical flaws

My Cloud from Western Digital is one of the most popular network-attached storage (NAS) devices that are being used by…

Ex Yandex employee leaks source code of different Yandex services
26
Jan
2023

Ex Yandex employee leaks source code of different Yandex services

A Yandex source code repository that was apparently taken by an ex-worker of the Russian IT giant has been published…

Mexican tax agency SAT hack. Myth or Real?
26
Jan
2023

Mexican tax agency SAT hack. Myth or Real?

On Tuesday, January 24, many news organizations claimed that the SAT site had been hacked. In response to these reports,…

Yahoo has become the most impersonated brand in phishing attacks leaving behind DHL
25
Jan
2023

Yahoo has become the most impersonated brand in phishing attacks leaving behind DHL

During the fourth quarter of 2022, Yahoo was the target of twenty percent of all brand phishing attempts. Investigators discovered…

How a SMS message allowed taking control of Zendesk company's network
25
Jan
2023

How a SMS message allowed taking control of Zendesk company’s network

The security of Zendesk, a company that provides customer care solutions, was breached on October 25, 2022 as a direct…

8 cyber security measures that must be implemented for securing IPv6 networks
23
Jan
2023

8 cyber security measures that must be implemented for securing IPv6 networks

Internet Protocol (IP) is the protocol that the vast majority of networked devices use in order to communicate. IP version…

How the famous Argentinean Scammer " El Hacker or C14" was tracked and arrested by Police
20
Jan
2023

How the famous Argentinean Scammer ” El Hacker or C14″ was tracked and arrested by Police

He resided at Saint Thomas Country Club. He then moved to El Rebenque, a gated enclave near Canning, where he…

Ransomware shuts down hundreds of KFC, Pizza Hut & Taco Bell restaurants
20
Jan
2023

Ransomware shuts down hundreds of KFC, Pizza Hut & Taco Bell restaurants

Yum! Brands has over 5 billion dollars in total assets and generates 1.3 billion dollars in net profit per year….