Category: ExploitOne

This Curl vulnerability that will affect every server in the world
06
Oct
2023

This Curl vulnerability that will affect every server in the world

Since its debut in 1996 under the stewardship of Daniel Stenberg, the curl tool has undergone significant evolutionary transformations, responding…

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account
05
Oct
2023

Hacking into an enterprise Atlassian Confluence and creating a permanent admin account

In the tech realm, the unsettling words ‘zero-day vulnerability’ can send shivers down the spine of even the most hardened…

An old way to break RSA encryption algorithm that works in 2023
03
Oct
2023

An old way to break RSA encryption algorithm that works in 2023

A longstanding timing oracle attack targeting RSA encryption has resurfaced, as identified by a researcher from Red Hat. This particular…

Largest soft drink bottle supplier, recycle and plastic manufacturers hacked by ransomware
28
Sep
2023

Largest soft drink bottle supplier, recycle and plastic manufacturers hacked by ransomware

Johnson Controls International plc operates globally as a conglomerate, boasting a varied array of products and services with a predominant…

This vulnerability allows hacking Microsoft SharePoint Server with this exploit code
27
Sep
2023

This vulnerability allows hacking Microsoft SharePoint Server with this exploit code

The proof-of-concept (PoC) attack code for a major vulnerability known as CVE-2023-29357 has been made public. This vulnerability allows users…

Biggest law firm hacked by MOVEit flaw, 16 millions victim's data leaked
26
Sep
2023

Ransomware in 2023: Emerging Threats and Countermeasures

The relentless onslaught of ransomware attacks remains an ever-present challenge for businesses and security experts. As 2023 is slowly approaching…

Execute arbitrary code on the Docker Server exploiting these 3 vulnerabilities
26
Sep
2023

Execute arbitrary code on the Docker Server exploiting these 3 vulnerabilities

In this day and age of containerization, Docker Desktop stands strong as a guiding light for developers in the direction…

Visited thesaurus.com in search for Synonyms? You have Coinminer malware infection
25
Sep
2023

Visited thesaurus.com in search for Synonyms? You have Coinminer malware infection

Thesaurus is one of the most well-known platforms, with 5 million monthly visitors, and is regularly used by students, writers,…

MOVEit software vulnerability allows installing ransomware and is not just sql injection
21
Sep
2023

Three new SQL Injection vulnerabilities found in MOVEit Software

The MOVEit transfer service pack has been found to have three vulnerabilities, namely two SQL injections and one instance of…

How US intelligence hacked into Huawei Servers to find out how it is hacking US government
20
Sep
2023

How US intelligence hacked into Huawei Servers to find out how it is hacking US government

Huawei has gained recognition for its telecommunications infrastructure and consumer electronic devices, including smartphones. The United States of America imposed…

Colombian government hacked by Ransomware, biggest attack in the history
18
Sep
2023

Colombian government hacked by Ransomware, biggest attack in the history

A considerable number of Colombia’s most notable government departments are now coordinating their responses to a ransomware attack, which is…

How Repojacking attack on GitHub repos is done, to do supply chain attacks
15
Sep
2023

How Repojacking attack on GitHub repos is done, to do supply chain attacks

Researchers have discovered a new vulnerability in Github that might allow an attacker to take advantage of a race situation…