Category: ExploitOne

Zero day flaw 'Zenbleed' in AMD Zen 2 Ryzen 3000, EPYC CPUs can leak your enterprise data
25
Jul
2023

Zero day flaw ‘Zenbleed’ in AMD Zen 2 Ryzen 3000, EPYC CPUs can leak your enterprise data

The dangers posed by cybersecurity continue to advance, and processors are not exempt from this trend. CVE-2023-20593 is a severe…

Citrix/NetScaler vulnerability CVE-2023-3519 can cause more damage than one can imagine
21
Jul
2023

Citrix/NetScaler vulnerability CVE-2023-3519 can cause more damage than one can imagine

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has issued a warning that threat actors attempted to…

Two AMI BMC vulnerabilities allow destroying data centers around the world remotely
20
Jul
2023

Two AMI BMC vulnerabilities allow destroying data centers around the world remotely

Researchers from the security company Eclypsium investigated the AMI firmware that was stolen in the 2021 ransomware attack. They discovered…

Since Microsoft can't figure out how it got hacked, it lets customers see M365 logs for free
19
Jul
2023

Since Microsoft can’t figure out how it got hacked, it lets customers see M365 logs for free

Microsoft said on Wednesday that it will broaden logging settings for lower-tier M365 customers and prolong the time of retention…

Millions of Wordpress ecommerce websites affected by these two vulnerabilities
18
Jul
2023

Millions of WordPress ecommerce websites affected by these two vulnerabilities

Over one million different attempts have been made to get into a popular WordPress plugin over the last several days,…

Download WormGPT and launch easy cyber attacks or hack someone using AI just for $60
17
Jul
2023

Download WormGPT and launch easy cyber attacks or hack someone using AI just for $60

In recent years, there has been a phenomenal expansion in the use of generative artificial intelligence (AI). Since the launch…

How new CVSS 4.0 framework is a game changer for cyber security industry
14
Jul
2023

How new CVSS 4.0 framework is a game changer for cyber security industry

The Common Vulnerability Scoring System (CVSS) framework, which is used by cybersecurity experts and manufacturers to convey data about software…

Taking control of network by hacking Citrix Secure Access Client vulnerabilities
12
Jul
2023

Taking control of network by hacking Citrix Secure Access Client vulnerabilities

Citrix is a cloud computing firm with its headquarters in Florida. Citrix focuses in the areas of computer software, virtualization,…

How cybercriminals forge digital signatures on kernel-mode malicious drivers to bypass EDR
11
Jul
2023

How cybercriminals forge digital signatures on kernel-mode malicious drivers to bypass EDR

Chinese-speaking threat actors have been shown to be using a Microsoft Windows policy vulnerability to spoof signatures on kernel-mode drivers….

Biggest law firm hacked by MOVEit flaw, 16 millions victim's data leaked
10
Jul
2023

Biggest law firm hacked by MOVEit flaw, 16 millions victim’s data leaked

According to Nypost, the personal information of millionsof customers of three of the largest legal firms in the nation may…

This exploit code allows hacking into Barracuda Email Security Gateway (ESG) appliance
06
Jul
2023

This exploit code allows hacking into Barracuda Email Security Gateway (ESG) appliance

Rapid7 published detailed anaysis and exploit of flaw in Barracuda Email Security Gateway (ESG) appliance. It has been discovered that…

New tool TeamsPhisher allows to hack victims teams account and infect victim with malware
05
Jul
2023

New tool TeamsPhisher allows to hack victims teams account and infect victim with malware

It is getting more difficult to introduce malware into organizations that are being targeted. Many of the conventional payload types,…