Category: ExploitOne

How new CVSS 4.0 framework is a game changer for cyber security industry
14
Jul
2023

How new CVSS 4.0 framework is a game changer for cyber security industry

The Common Vulnerability Scoring System (CVSS) framework, which is used by cybersecurity experts and manufacturers to convey data about software…

Taking control of network by hacking Citrix Secure Access Client vulnerabilities
12
Jul
2023

Taking control of network by hacking Citrix Secure Access Client vulnerabilities

Citrix is a cloud computing firm with its headquarters in Florida. Citrix focuses in the areas of computer software, virtualization,…

How cybercriminals forge digital signatures on kernel-mode malicious drivers to bypass EDR
11
Jul
2023

How cybercriminals forge digital signatures on kernel-mode malicious drivers to bypass EDR

Chinese-speaking threat actors have been shown to be using a Microsoft Windows policy vulnerability to spoof signatures on kernel-mode drivers….

Biggest law firm hacked by MOVEit flaw, 16 millions victim's data leaked
10
Jul
2023

Biggest law firm hacked by MOVEit flaw, 16 millions victim’s data leaked

According to Nypost, the personal information of millionsof customers of three of the largest legal firms in the nation may…

This exploit code allows hacking into Barracuda Email Security Gateway (ESG) appliance
06
Jul
2023

This exploit code allows hacking into Barracuda Email Security Gateway (ESG) appliance

Rapid7 published detailed anaysis and exploit of flaw in Barracuda Email Security Gateway (ESG) appliance. It has been discovered that…

New tool TeamsPhisher allows to hack victims teams account and infect victim with malware
05
Jul
2023

New tool TeamsPhisher allows to hack victims teams account and infect victim with malware

It is getting more difficult to introduce malware into organizations that are being targeted. Many of the conventional payload types,…

CWE Top 25 Most Dangerous Software vulnerabilities for 2023
29
Jun
2023

CWE Top 25 Most Dangerous Software vulnerabilities for 2023

The Common Weakness Enumeration team has just announced the publication of a list titled 2023’s Top 25 Most Dangerous Software…

Android phone spying application hacked by robinhood hacker
28
Jun
2023

Android phone spying application hacked by robinhood hacker

LetMeSpy is a form of phone monitoring app that may be used for parental control or employee surveillance, depending on…

Industrial Control Systems (ICS) manufacturers Schneider Electric and Siemens Energy hacked
27
Jun
2023

Industrial Control Systems (ICS) manufacturers Schneider Electric and Siemens Energy hacked

The Clop ransomware organization has uploaded five more victims of MOVEit attacks to its dark web leak site. Among these…

He is the "El Chapo" of darkweb and king of online drug trade
27
Jun
2023

He is the “El Chapo” of darkweb and king of online drug trade

Milomir Desnica has been charged by the United States Department of Justice of operating the website known as Monopoly Market…

Hack networks via Fortinet FortiNAC by sending specially crafted requests to the tcp/1050 service
23
Jun
2023

Hack networks via Fortinet FortiNAC by sending specially crafted requests to the tcp/1050 service

This problem arises as the importance of cybersecurity around the globe continues to grow. The security architecture of our network…

SAP employees are stealing hard drives from data center and selling on eBay
22
Jun
2023

SAP employees are stealing hard drives from data center and selling on eBay

An SSD drive that was reported stolen from a SAP datacenter in Walldorf has been discovered on eBay, which has…