Category: ExploitOne

Vulnerability in WinRAR allows running malicious code when extracting a RAR file:CVE-2023-40477
21
Aug
2023

Vulnerability in WinRAR allows running malicious code when extracting a RAR file:CVE-2023-40477

An arbitrary code execution vulnerability was found in WinRAR, and it is possible to exploit this issue by opening a…

How easy is to bomb someone mobile phone with thousands of SMS messages?
18
Aug
2023

How easy is to bomb someone mobile phone with thousands of SMS messages?

SMS Bomber attacks are becoming more prominent as a contemporary risk that has the potential to have substantial and unsettling…

Biggest cleaning product manufacturer Clorox hacked
15
Aug
2023

Biggest cleaning product manufacturer Clorox hacked

This week, cleaning product manufacturer Clorox disclosed a cybersecurity issue that resulted in the company having to take a number…

Disable WiFi in Ford & Lincoln Cars before someone hacks into your car. Serious Wi-FI flaw
14
Aug
2023

Disable WiFi in Ford & Lincoln Cars before someone hacks into your car. Serious Wi-FI flaw

A buffer overflow vulnerability was discovered not too long ago in the Wi-Fi driver that Ford employs in the SYNC…

New hacking tools "Nightclubs" & "Discos" used to hack Embassies
11
Aug
2023

New hacking tools “Nightclubs” & “Discos” used to hack Embassies

Hackers in Belarus are focusing their attention on foreign embassies in the hopes of stealing papers, recording audio, and tracking…

40 Million british voters data exposed after Electoral Commission hack
11
Aug
2023

40 Million british voters data exposed after Electoral Commission hack

The United Kingdom Electoral Commission, which is responsible for protecting voter information, recently had a complicated data breach, which resulted…

New technique allows listening and guessing victim's smartphone or keyboard keystrokes
09
Aug
2023

New technique allows listening and guessing victim’s smartphone or keyboard keystrokes

A recent investigation of acoustic side-channel attacks was carried out by a group of researchers drawn from a number of…

This new DDoS attack prevention technique has a 90% accuracy rate
08
Aug
2023

This new DDoS attack prevention technique has a 90% accuracy rate

In comparison to the approaches that are now used, the detection capabilities of a typical internet attack have been much…

North Korea hacks Russian Missile Engineering Company for missile designs
07
Aug
2023

North Korea hacks Russian Missile Engineering Company for missile designs

The threat actors associated with North Korea aggressively drew the attention of security specialists, exposing useful campaign insights during the…

Top 42 vulnerabilities exploited by hackers
04
Aug
2023

Top 42 vulnerabilities exploited by hackers

The National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Five Eyes (Five Eyes) from a variety…

How to secure Cisco Firepower Threat Defense (FTD) firewalls ?
04
Aug
2023

How to secure Cisco Firepower Threat Defense (FTD) firewalls ?

The National Security Agency (NSA) has published best practices for setting and hardening Cisco Firepower Threat Defense (FTD). These best…

How to use AWS SSM agent as backdoor and hack into EC2 instances?
03
Aug
2023

How to use AWS SSM agent as backdoor and hack into EC2 instances?

Amazon Web Services (AWS) has a novel post-exploitation approach that has been identified by researchers. This technique enables hackers to…