Category: ExploitOne

Inside Their CI/CD Software Hacking Secrets
27
Oct
2023

Inside Their CI/CD Software Hacking Secrets

In recent weeks, the renowned Lazarus gang, which acts as a cyber threat actor, has been more active than usual,…

After Casio, Sieko Group hacked again by Ransomware gang
26
Oct
2023

After Casio, Sieko Group hacked again by Ransomware gang

The Seiko Group, known for its timekeeping business, suffered a ransomware attack in July 2023 that led to the theft…

The Masterminds Behind Spain's Largest Data Heist Arrested
25
Oct
2023

The Masterminds Behind Spain’s Largest Data Heist Arrested

The Spanish National Police have successfully dismantled a sophisticated cybercriminal organization, resulting in the arrest of 34 individuals. This organization…

The Inside Story of Casio's Global Data Breach!
20
Oct
2023

The Inside Story of Casio’s Global Data Breach!

The recent Casio hack has left a significant impact on the data security of individuals and organizations across 149 countries….

The ServiceNow Vulnerability You Can't Ignore: Nightmare for millions
19
Oct
2023

The ServiceNow Vulnerability You Can’t Ignore: Nightmare for millions

A vulnerability has been identified in the digital business platform known as ServiceNow, and this poses a significant risk to…

A Comparative Analysis of Native Cloud Security Services
18
Oct
2023

A Comparative Analysis of Native Cloud Security Services

Cloud computing giants, Microsoft Azure and Amazon Web Services (AWS), offer a vast array of native security services to protect,…

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers
13
Oct
2023

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers

In the ever-evolving landscape of cybersecurity, securing development environments has burgeoned into a topic of paramount concern, particularly given the…

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet
11
Oct
2023

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet

Recent months have witnessed the emergence and exploitation of a distinctive zero-day vulnerability, dubbed “HTTP/2 Rapid Reset”, resulting in unprecedented…

Navigating Through the Silent Threats in ConnectedIO's 3G/4G Routers
10
Oct
2023

Navigating Through the Silent Threats in ConnectedIO’s 3G/4G Routers

Security Vulnerabilities in ConnectedIO’s 3G/4G Routers ConnectedIO’s ER2000 edge routers are integral components in the contemporary digital communication infrastructure, facilitating…

This Curl vulnerability that will affect every server in the world
06
Oct
2023

This Curl vulnerability that will affect every server in the world

Since its debut in 1996 under the stewardship of Daniel Stenberg, the curl tool has undergone significant evolutionary transformations, responding…

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account
05
Oct
2023

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account

In the tech realm, the unsettling words ‘zero-day vulnerability’ can send shivers down the spine of even the most hardened…

An old way to break RSA encryption algorithm that works in 2023
03
Oct
2023

An old way to break RSA encryption algorithm that works in 2023

A longstanding timing oracle attack targeting RSA encryption has resurfaced, as identified by a researcher from Red Hat. This particular…