Category: ExploitOne

The Devastating PixieFail Flaws in UEFI – Is Your Device at Risk?
19
Jan
2024

The Devastating PixieFail Flaws in UEFI – Is Your Device at Risk?

The recent discovery of “PixieFail,” a set of nine vulnerabilities in Tianocore’s EDK II IPv6 network stack, has raised significant…

How Dutch Genius Who Hacked Iran's Nuclear Program was Killed
10
Jan
2024

How Dutch Genius Who Hacked Iran’s Nuclear Program was Killed

Stuxnet, a name that resonates with infamy in the cybersecurity world, represents a watershed moment in digital warfare. This sophisticated…

Hacking Windows 10 and 11 with DLL Search Order Hijacking without administrator rights
02
Jan
2024

Hacking Windows 10 and 11 with DLL Search Order Hijacking without administrator rights

A recent investigation by Security Joes has unveiled a novel cyberattack method targeting the Windows operating system. This technique exploits…

How Scammers Use QR Codes to Phish Your Secrets
14
Dec
2023

How Scammers Use QR Codes to Phish Your Secrets

In the dynamic realm of cybersecurity, a new threat has emerged, capturing the attention of experts and users alike: Quishing….

Understanding Latest DHCP DNS Vulnerabilities and How DHCP Exploits work in Active Directory
12
Dec
2023

Understanding Latest DHCP DNS Vulnerabilities and How DHCP Exploits work in Active Directory

A new research focuses on a newly discovered set of attacks against Active Directory (AD) using Microsoft DHCP servers, which…

Your Laptop's Fingerprint Lock Can Be Hacked. How Hackers Exploit Fingerprint Sensors Flaws
23
Nov
2023

Your Laptop’s Fingerprint Lock Can Be Hacked. How Hackers Exploit Fingerprint Sensors Flaws

Multiple vulnerabilities have been found in the fingerprint sensors of Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro…

6 Steps to File Anonymous SEC Complaints Against Data Breachers & Force Them to Pay Fines or Take Action
17
Nov
2023

6 Steps to File Anonymous SEC Complaints Against Data Breachers & Force Them to Pay Fines or Take Action

The U.S. Securities and Exchange Commission (SEC) has guidelines and rules that relate to how publicly traded companies must handle…

How Your ChatGPT's Uploaded Files Could Be Stolen by Prompt Injection Vulnerability
16
Nov
2023

How Your ChatGPT’s Uploaded Files Could Be Stolen by Prompt Injection Vulnerability

In a startling revelation, ChatGPT, the advanced AI chatbot developed by OpenAI, has been found to have a significant security…

This Atlassian Confluence Server backdoor will add malware in every page and can't be removed
10
Nov
2023

This Atlassian Confluence Server backdoor will add malware in every page and can’t be removed

CVE-2023-22515 and CVE-2023-22518 are critical vulnerabilities found in Atlassian Confluence, a widely used team collaboration software. CVE-2023-22515 Description: This vulnerability…

This Google Calendar technique allows to hack into companies without getting detected
07
Nov
2023

This Google Calendar technique allows to hack into companies without getting detected

Google has warned about a method by which hackers could exploit its Calendar service to create a covert Command-and-Control (C2)…

An old way to break RSA encryption algorithm that works in 2023
03
Nov
2023

RSA-2048 Shattered:Experts decrypt RSA-2048 with a Cellphone

RSA-2048 is a widely used encryption scheme based on the RSA (Rivest–Shamir–Adleman) cryptosystem. The “2048” in RSA-2048 denotes the key…

Hijacked Data:LockBit Ransomware Gang Targets Aerospace Giant Boeing
30
Oct
2023

Hijacked Data:LockBit Ransomware Gang Targets Aerospace Giant Boeing

It would seem that the global leader in aerospace, Boeing, is the most recent victim of the ransomware gang known…