exploit

  1. Tomcat

    DEX Velocore lost $6.8 million as a result of the exploit

    The decentralized exchange Velocore was attacked. The hacker removed approximately $6.8 million in Ethereum (ETH) from the pools in the L2 networks Linea and zkSyncEra. The Linea team decided to stop the sequencer to prevent further loss of funds from Velocore users. The hacker managed to...
  2. Tomcat

    99.4% success rate: zero-day exploit for all current Windows for sale

    You can upgrade your privileges in just two seconds. How much do hackers want for a new hacking tool? A new exploit for local Privilege escalation (LPE) in Windows operating systems has appeared on underground hacker forums. According to the seller under the pseudonym "vulns-rock", the exploit...
  3. BulletHost

    BulletHost.IO | BOTNET / PHISHING / BRUTE / EXPLOIT / SCAN ALLOWED | Bulletproof & Anonymous

    Price: 29.99€ - 79.99€ Contacnts: Website Ticket or t.me/bullethost_support_bot
  4. Father

    Darknet sells zero-day vulnerability exploit in iOS for 2.5 million euros

    Online Database Monitoring Company Webz.io I found out that the darknet sells an exploit of a new zero-day vulnerability for iOS and macOS devices. It is based on the vulnerability CVE-2022-32893, which the company fixed the other day. However, the researchers claim that the exploit is intended...
  5. Father

    Gala Games lost more than $200 million as a result of the exploit

    An unknown person has issued and withdrawn 5 billion GALA tokens of the Gala Games Web3 gaming platform for about $210 million, according to Etherscan data. The attacker was able to sell 600 million GALA through the Uniswap decentralized exchange. Against this background, the price of the asset...
  6. Father

    High-level RCE exploit for Outlook offered for sale for $1.7 million

    Literally every Microsoft Office user is in danger. How do I protect my devices from hacking? A very worrying situation is brewing in the world of cybersecurity. A hacker under the pseudonym "Cvsp" on one of the cybercrime forums announced the sale of an RCE exploit for a zero-day vulnerability...
  7. Father

    The Ivanti exploit chain is actively used to implement the Mirai botnet

    CVE-2023-46805 and CVE-2024-21887 – one-way tickets for your network security. New vulnerabilities in Ivanti Connect Secure devices allow attackers to deploy the Mirai botnet. This is reported by security researchers from Juniper, indicating the active exploitation of two...
  8. Father

    EternalBlue: what is known about the most high-profile exploit in history

    Russia ranked second in terms of the number of systems that remain vulnerable to a critical exploit. How EternalBlue works and what it can threaten Russian companies – read the Cyber Media article. EternalBlue is an exploit for Windows that was created by the US National Security Agency (NSA)...
  9. Father

    GPT-4 can independently exploit 1-day vulnerabilities with up to 87% success rate %

    A study conducted at the University of Illinois (UIUC) showed that GPT-4 in combination with automation tools is able to exploit vulnerabilities of one day (disclosed, but without a patch) by reading their descriptions. The success rate can reach 87%. In a comment for The Register, one of the...
  10. Father

    82,000 firewalls at risk: a working exploit has been released for a vulnerability in PAN-OS

    Experts from Palo Alto are doing everything possible to protect users, but even this may not be enough. An exploit was recently discovered on the Internet for a critical vulnerability in the PAN-OS software used in Palo Alto Networks firewalls. Vulnerability CVE-2024-3400, which we wrote about...
  11. Father

    Disable iMessage immediately: A $2 million exploit gives you control of the iPhone without a single click

    Trust Wallet under fire for reporting iMessage vulnerability. Trust Wallet has called on Apple users to disable iMessage because of information about a critical zero-day vulnerability that allows hackers to seize control of smartphones. According to Trust Wallet, the vulnerability allows an...
  12. Teacher

    The Munchables project based on Blast suffered from an exploit worth $62 million

    An NFT project called Munchables, created on the basis of Blast, an Ethereum-based second-tier network, has been exploited. The hacker managed to steal 17,413 ETH worth $62 million. The developers of Munchables announced on social network X that their platform was compromised. They track the...
  13. Teacher

    Hackers got the key to FortiClient EMS: PoC-open access exploit

    Administrators need to take measures to protect corporate systems. Horizon3 security researchers have released a PoC exploit of the critical Fortinet FortiClient EMS vulnerability, which is currently being actively exploited by hackers. The SQL injection vulnerability CVE-2023-48788 (CVSS...
  14. Teacher

    Blueberry DeFi protocol suspended due to an exploit

    On February 23, the Blueberry lending protocol froze the platform's operation and withdrawal of deposits to prevent a hacker attack. Over time, the situation was stabilized and the hacking was stopped. According to the developers, the deposited funds "are no longer subject to exploitation."...
  15. Brother

    Orbit Bridge was affected by an 82 million exploit

    A large-scale theft of cryptocurrencies on the eve of 2024 is causing alarm in the crypto community. Unknown hackers broke into Orbit Bridge, the service of bridges between the chains of the Orbit Chain protocol, stealing a total of $ 82 million in three hours before the new year. In a...
  16. Lord777

    An exploit is available that allows you to bypass the last line of protection in Windows

    Vulnerability CVE-2023-36025 is actively used by cybercriminals. Microsoft recently released a security update to address a critical zero-day vulnerability in SmartScreen security technology in the Windows operating system. However, the exploit for this vulnerability was already used by...
  17. Lord777

    Old bug – new risks: after publishing an exploit for a defect in CrushFTP, 10,000 servers are at risk

    The August patch was not the most reliable measure. A dangerous bug has been discovered in the popular secure file sharing software CrushFTP, which gives attackers the opportunity to gain full control over the vulnerable server. In fact, Converge experts discovered the vulnerability...
  18. Carding 4 Carders

    Public exploit increases the risk of cyber attacks on Cisco IOS XE

    Despite the update, tens of thousands of devices remain at risk. An exploit for the critical vulnerability CVE-2023-20198 in Cisco IOS XE, which was used to hack tens of thousands of devices, has become publicly available. Cisco has released patches for most versions of IOS XE, but thousands of...
  19. Carding 4 Carders

    Dark times for IT: North Korean hackers exploit TeamCity weaknesses

    Despite the fix, the flaw is actively used to hack corporate networks. Microsoft warns that North Korean hacking groups Lazarus and Andariel are exploiting a vulnerability in TeamCity servers to deploy malware to compromise the software supply chain. TeamCity is a continuous integration and...
  20. Carding

    Hackers exploit the search function in Windows Explorer to install remote access Trojans

    A JavaScript script from the browser lures users into a clever trap. Cybersecurity experts have discovered that attackers use a legitimate search function in Windows to secretly download malware to their victims ' computers. In this way, hackers can gain full access to the system and steal...
Top