Category: ExploitOne

Fan of Splunk SIEM? You should be worried as it can now be exploited to leak your company data
02
Aug
2023

Exploiting Splunk SOAR vulnerability to hack into secure network

Splunk has found a vulnerability that enables unauthenticated log injection, which opens the door for hostile actors to execute dangerous…

US DoD invites a restricted number of hackers to Hack the Pentagon
31
Jul
2023

US Air Force, FBI and Tennessee state agencies radio communication system compromised

According to a search warrant that was acquired by Forbes, the Pentagon is conducting an investigation into what it has…

Android users can now detect Bluetooth trackers, such as AirTag, without the need for an app
28
Jul
2023

Android users can now detect Bluetooth trackers, such as AirTag, without the need for an app

In the month of May, both Google and Apple made the announcement that they were going to work together to…

Businesses have four days to report cyberattacks. CEOs dislike this US government decision
27
Jul
2023

Businesses have four days to report cyberattacks. CEOs dislike this US government decision

The United States Securities and Exchange Commission (SEC) has approved new regulations that call for publicly-traded companies to report significant…

New tool FraudGPT allows scamming and easy hacking of victims using AI
26
Jul
2023

New tool FraudGPT allows scamming and easy hacking of victims using AI

Cybercriminals have just released a new tool known as FraudGPT, which represents a significant risk to both private persons and…

In 2023, the worldwide average cost of a data breach rose 15% to $4.45 million USD
25
Jul
2023

In 2023, the worldwide average cost of a data breach rose 15% to $4.45 million USD

According to the latest Cost of a Data Breach study from IBM, the worldwide average cost of a data breach…

Zero day flaw 'Zenbleed' in AMD Zen 2 Ryzen 3000, EPYC CPUs can leak your enterprise data
25
Jul
2023

Zero day flaw ‘Zenbleed’ in AMD Zen 2 Ryzen 3000, EPYC CPUs can leak your enterprise data

The dangers posed by cybersecurity continue to advance, and processors are not exempt from this trend. CVE-2023-20593 is a severe…

Citrix/NetScaler vulnerability CVE-2023-3519 can cause more damage than one can imagine
21
Jul
2023

Citrix/NetScaler vulnerability CVE-2023-3519 can cause more damage than one can imagine

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has issued a warning that threat actors attempted to…

Two AMI BMC vulnerabilities allow destroying data centers around the world remotely
20
Jul
2023

Two AMI BMC vulnerabilities allow destroying data centers around the world remotely

Researchers from the security company Eclypsium investigated the AMI firmware that was stolen in the 2021 ransomware attack. They discovered…

Since Microsoft can't figure out how it got hacked, it lets customers see M365 logs for free
19
Jul
2023

Since Microsoft can’t figure out how it got hacked, it lets customers see M365 logs for free

Microsoft said on Wednesday that it will broaden logging settings for lower-tier M365 customers and prolong the time of retention…

Millions of Wordpress ecommerce websites affected by these two vulnerabilities
18
Jul
2023

Millions of WordPress ecommerce websites affected by these two vulnerabilities

Over one million different attempts have been made to get into a popular WordPress plugin over the last several days,…

Download WormGPT and launch easy cyber attacks or hack someone using AI just for $60
17
Jul
2023

Download WormGPT and launch easy cyber attacks or hack someone using AI just for $60

In recent years, there has been a phenomenal expansion in the use of generative artificial intelligence (AI). Since the launch…