Category: ExploitOne

The Inside Story of Casio's Global Data Breach!
20
Oct
2023

The Inside Story of Casio’s Global Data Breach!

The recent Casio hack has left a significant impact on the data security of individuals and organizations across 149 countries….

The ServiceNow Vulnerability You Can't Ignore: Nightmare for millions
19
Oct
2023

The ServiceNow Vulnerability You Can’t Ignore: Nightmare for millions

A vulnerability has been identified in the digital business platform known as ServiceNow, and this poses a significant risk to…

A Comparative Analysis of Native Cloud Security Services
18
Oct
2023

A Comparative Analysis of Native Cloud Security Services

Cloud computing giants, Microsoft Azure and Amazon Web Services (AWS), offer a vast array of native security services to protect,…

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers
13
Oct
2023

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers

In the ever-evolving landscape of cybersecurity, securing development environments has burgeoned into a topic of paramount concern, particularly given the…

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet
11
Oct
2023

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet

Recent months have witnessed the emergence and exploitation of a distinctive zero-day vulnerability, dubbed “HTTP/2 Rapid Reset”, resulting in unprecedented…

Navigating Through the Silent Threats in ConnectedIO's 3G/4G Routers
10
Oct
2023

Navigating Through the Silent Threats in ConnectedIO’s 3G/4G Routers

Security Vulnerabilities in ConnectedIO’s 3G/4G Routers ConnectedIO’s ER2000 edge routers are integral components in the contemporary digital communication infrastructure, facilitating…

This Curl vulnerability that will affect every server in the world
06
Oct
2023

This Curl vulnerability that will affect every server in the world

Since its debut in 1996 under the stewardship of Daniel Stenberg, the curl tool has undergone significant evolutionary transformations, responding…

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account
05
Oct
2023

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account

In the tech realm, the unsettling words ‘zero-day vulnerability’ can send shivers down the spine of even the most hardened…

An old way to break RSA encryption algorithm that works in 2023
03
Oct
2023

An old way to break RSA encryption algorithm that works in 2023

A longstanding timing oracle attack targeting RSA encryption has resurfaced, as identified by a researcher from Red Hat. This particular…

Largest soft drink bottle supplier, recycle and plastic manufacturers hacked by ransomware
28
Sep
2023

Largest soft drink bottle supplier, recycle and plastic manufacturers hacked by ransomware

Johnson Controls International plc operates globally as a conglomerate, boasting a varied array of products and services with a predominant…

This vulnerability allows hacking Microsoft SharePoint Server with this exploit code
27
Sep
2023

This vulnerability allows hacking Microsoft SharePoint Server with this exploit code

The proof-of-concept (PoC) attack code for a major vulnerability known as CVE-2023-29357 has been made public. This vulnerability allows users…

Biggest law firm hacked by MOVEit flaw, 16 millions victim's data leaked
26
Sep
2023

Ransomware in 2023: Emerging Threats and Countermeasures

The relentless onslaught of ransomware attacks remains an ever-present challenge for businesses and security experts. As 2023 is slowly approaching…