Category: ExploitOne

New technique allows listening and guessing victim's smartphone or keyboard keystrokes
09
Aug
2023

New technique allows listening and guessing victim’s smartphone or keyboard keystrokes

A recent investigation of acoustic side-channel attacks was carried out by a group of researchers drawn from a number of…

This new DDoS attack prevention technique has a 90% accuracy rate
08
Aug
2023

This new DDoS attack prevention technique has a 90% accuracy rate

In comparison to the approaches that are now used, the detection capabilities of a typical internet attack have been much…

North Korea hacks Russian Missile Engineering Company for missile designs
07
Aug
2023

North Korea hacks Russian Missile Engineering Company for missile designs

The threat actors associated with North Korea aggressively drew the attention of security specialists, exposing useful campaign insights during the…

Top 42 vulnerabilities exploited by hackers
04
Aug
2023

Top 42 vulnerabilities exploited by hackers

The National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Five Eyes (Five Eyes) from a variety…

How to secure Cisco Firepower Threat Defense (FTD) firewalls ?
04
Aug
2023

How to secure Cisco Firepower Threat Defense (FTD) firewalls ?

The National Security Agency (NSA) has published best practices for setting and hardening Cisco Firepower Threat Defense (FTD). These best…

How to use AWS SSM agent as backdoor and hack into EC2 instances?
03
Aug
2023

How to use AWS SSM agent as backdoor and hack into EC2 instances?

Amazon Web Services (AWS) has a novel post-exploitation approach that has been identified by researchers. This technique enables hackers to…

Fan of Splunk SIEM? You should be worried as it can now be exploited to leak your company data
02
Aug
2023

Exploiting Splunk SOAR vulnerability to hack into secure network

Splunk has found a vulnerability that enables unauthenticated log injection, which opens the door for hostile actors to execute dangerous…

US DoD invites a restricted number of hackers to Hack the Pentagon
31
Jul
2023

US Air Force, FBI and Tennessee state agencies radio communication system compromised

According to a search warrant that was acquired by Forbes, the Pentagon is conducting an investigation into what it has…

Android users can now detect Bluetooth trackers, such as AirTag, without the need for an app
28
Jul
2023

Android users can now detect Bluetooth trackers, such as AirTag, without the need for an app

In the month of May, both Google and Apple made the announcement that they were going to work together to…

Businesses have four days to report cyberattacks. CEOs dislike this US government decision
27
Jul
2023

Businesses have four days to report cyberattacks. CEOs dislike this US government decision

The United States Securities and Exchange Commission (SEC) has approved new regulations that call for publicly-traded companies to report significant…

New tool FraudGPT allows scamming and easy hacking of victims using AI
26
Jul
2023

New tool FraudGPT allows scamming and easy hacking of victims using AI

Cybercriminals have just released a new tool known as FraudGPT, which represents a significant risk to both private persons and…

In 2023, the worldwide average cost of a data breach rose 15% to $4.45 million USD
25
Jul
2023

In 2023, the worldwide average cost of a data breach rose 15% to $4.45 million USD

According to the latest Cost of a Data Breach study from IBM, the worldwide average cost of a data breach…