Category: ExploitOne

How Opening a Simple PDF Could Unleash a Cybersecurity Nightmare
04
Mar
2024

How Opening a Simple PDF Could Unleash a Cybersecurity Nightmare

The recent findings from McAfee Labs have unveiled a worrying trend in the cybersecurity landscape: a significant increase in malware…

Exploiting the High-Risk Vulnerabilities in Secure Boot of Most Linux Devices on the Planet
09
Feb
2024

Exploiting the High-Risk Vulnerabilities in Secure Boot of Most Linux Devices on the Planet

In the ever-evolving landscape of cybersecurity, a new vulnerability identified as CVE-2023-40547 has emerged, casting a shadow over the security…

A Hacker, 5000 Credentials, and Operation Code Red
05
Feb
2024

A Hacker, 5000 Credentials, and Operation Code Red

In a significant cybersecurity incident, Cloudflare, a leading web security and performance company, disclosed that it had been targeted by…

Hackers' New Target is containerized environments through vulnerabilities in runC
01
Feb
2024

Hackers’ New Target is containerized environments through vulnerabilities in runC

Recent developments in cybersecurity have brought to light multiple security vulnerabilities in the runC command line tool. These vulnerabilities pose…

Hacking Android, Linux, macOS, iOS, Windows Devices via Bluetooth using a single vulnerability
23
Jan
2024

Hacking Android, Linux, macOS, iOS, Windows Devices via Bluetooth using a single vulnerability

A critical vulnerability identified as CVE-2023-45866, along with CVE-2024-21306, has been discovered in the Bluetooth technology used across various operating…

The Devastating PixieFail Flaws in UEFI – Is Your Device at Risk?
19
Jan
2024

The Devastating PixieFail Flaws in UEFI – Is Your Device at Risk?

The recent discovery of “PixieFail,” a set of nine vulnerabilities in Tianocore’s EDK II IPv6 network stack, has raised significant…

How Dutch Genius Who Hacked Iran's Nuclear Program was Killed
10
Jan
2024

How Dutch Genius Who Hacked Iran’s Nuclear Program was Killed

Stuxnet, a name that resonates with infamy in the cybersecurity world, represents a watershed moment in digital warfare. This sophisticated…

Hacking Windows 10 and 11 with DLL Search Order Hijacking without administrator rights
02
Jan
2024

Hacking Windows 10 and 11 with DLL Search Order Hijacking without administrator rights

A recent investigation by Security Joes has unveiled a novel cyberattack method targeting the Windows operating system. This technique exploits…

How Scammers Use QR Codes to Phish Your Secrets
14
Dec
2023

How Scammers Use QR Codes to Phish Your Secrets

In the dynamic realm of cybersecurity, a new threat has emerged, capturing the attention of experts and users alike: Quishing….

Understanding Latest DHCP DNS Vulnerabilities and How DHCP Exploits work in Active Directory
12
Dec
2023

Understanding Latest DHCP DNS Vulnerabilities and How DHCP Exploits work in Active Directory

A new research focuses on a newly discovered set of attacks against Active Directory (AD) using Microsoft DHCP servers, which…

Your Laptop's Fingerprint Lock Can Be Hacked. How Hackers Exploit Fingerprint Sensors Flaws
23
Nov
2023

Your Laptop’s Fingerprint Lock Can Be Hacked. How Hackers Exploit Fingerprint Sensors Flaws

Multiple vulnerabilities have been found in the fingerprint sensors of Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro…

6 Steps to File Anonymous SEC Complaints Against Data Breachers & Force Them to Pay Fines or Take Action
17
Nov
2023

6 Steps to File Anonymous SEC Complaints Against Data Breachers & Force Them to Pay Fines or Take Action

The U.S. Securities and Exchange Commission (SEC) has guidelines and rules that relate to how publicly traded companies must handle…