Category: ExploitOne

This Google Calendar technique allows to hack into companies without getting detected
07
Nov
2023

This Google Calendar technique allows to hack into companies without getting detected

Google has warned about a method by which hackers could exploit its Calendar service to create a covert Command-and-Control (C2)…

An old way to break RSA encryption algorithm that works in 2023
03
Nov
2023

RSA-2048 Shattered:Experts decrypt RSA-2048 with a Cellphone

RSA-2048 is a widely used encryption scheme based on the RSA (Rivest–Shamir–Adleman) cryptosystem. The “2048” in RSA-2048 denotes the key…

Hijacked Data:LockBit Ransomware Gang Targets Aerospace Giant Boeing
30
Oct
2023

Hijacked Data:LockBit Ransomware Gang Targets Aerospace Giant Boeing

It would seem that the global leader in aerospace, Boeing, is the most recent victim of the ransomware gang known…

Inside Their CI/CD Software Hacking Secrets
27
Oct
2023

Inside Their CI/CD Software Hacking Secrets

In recent weeks, the renowned Lazarus gang, which acts as a cyber threat actor, has been more active than usual,…

After Casio, Sieko Group hacked again by Ransomware gang
26
Oct
2023

After Casio, Sieko Group hacked again by Ransomware gang

The Seiko Group, known for its timekeeping business, suffered a ransomware attack in July 2023 that led to the theft…

The Masterminds Behind Spain's Largest Data Heist Arrested
25
Oct
2023

The Masterminds Behind Spain’s Largest Data Heist Arrested

The Spanish National Police have successfully dismantled a sophisticated cybercriminal organization, resulting in the arrest of 34 individuals. This organization…

The Inside Story of Casio's Global Data Breach!
20
Oct
2023

The Inside Story of Casio’s Global Data Breach!

The recent Casio hack has left a significant impact on the data security of individuals and organizations across 149 countries….

The ServiceNow Vulnerability You Can't Ignore: Nightmare for millions
19
Oct
2023

The ServiceNow Vulnerability You Can’t Ignore: Nightmare for millions

A vulnerability has been identified in the digital business platform known as ServiceNow, and this poses a significant risk to…

A Comparative Analysis of Native Cloud Security Services
18
Oct
2023

A Comparative Analysis of Native Cloud Security Services

Cloud computing giants, Microsoft Azure and Amazon Web Services (AWS), offer a vast array of native security services to protect,…

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers
13
Oct
2023

A Zero-Day Visual Studio Vulnerability With Exploit Code That Could Spell Chaos for Developers

In the ever-evolving landscape of cybersecurity, securing development environments has burgeoned into a topic of paramount concern, particularly given the…

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet
11
Oct
2023

New Silent DDoS Attack at 398 Million Requests/Sec Threatens to Break Internet

Recent months have witnessed the emergence and exploitation of a distinctive zero-day vulnerability, dubbed “HTTP/2 Rapid Reset”, resulting in unprecedented…

Navigating Through the Silent Threats in ConnectedIO's 3G/4G Routers
10
Oct
2023

Navigating Through the Silent Threats in ConnectedIO’s 3G/4G Routers

Security Vulnerabilities in ConnectedIO’s 3G/4G Routers ConnectedIO’s ER2000 edge routers are integral components in the contemporary digital communication infrastructure, facilitating…