Web Hacking

Your blog category

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow

Please be advised, VMware users who follow hackingblogs, that serious vulnerabilities have been found in both VMware vCenter Server and VMware Cloud Foundation. We will talk about these two vulnerabilities in a moment. They are the VMware vCenter Server heap-overflow vulnerability and the VMware vCenter privilege escalation issue. The severity score for this serious vulnerabilities …

Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow Read More »

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers

Kévin – Mizu has openly provided his research papers on HTML parsing and the DOMPurify library. Let me simplify it for you and let us grasp this security research, which is essential for you to know and understand as a security researcher. What Is DOMPurify And Why Is It Used ? In order to prevent …

A Detailed Guide On HTML Parsing and DOMPurify Bypassing for Security Researchers Read More »

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669

Hi everyone, this is a crucial article since it details a dangerous false program that has been approved by the Google PlayStore and may be installed. Without further ado, let us get started. We are able to say that not everything that glitters is gold, as in this case, even though applications can be trusted, …

Beware Of These 8 Fake Application On Google Playstore As They Contain Trojan Android.FakeApp.1669 Read More »

Microsoft Zero Day Vulnerability Will Let An Attacker Get Into User’s PC And Exploit Local Privilege Escalation

Once an attacker gets onto a victim’s computer, they can exploit an LPE (Local Privilege Escalation) vulnerability to then take over the system and follow through with the attack. The vulnerability was discovered as part of a regular study of popular programs and the vendor was informed immediately as part of the responsible disclosure policy. The Microsoft team patched the issue shortly after, and all users should install the update as soon as possible, Head of the …

Microsoft Zero Day Vulnerability Will Let An Attacker Get Into User’s PC And Exploit Local Privilege Escalation Read More »

Zip Concatenation: Your Windows System Can Be Easily Hacked Using This New Technique

Greetings, my dear hacker family. As you are aware, hackers like us are constantly improving their methods of evading security measures. We have developed a new method to take advantage of systems. This method was recently used to hack a Windows system, and the worst part is that it is simple to set up but …

Zip Concatenation: Your Windows System Can Be Easily Hacked Using This New Technique Read More »

Thousand Of Call Of Duty Player Were Mysteriously Banned By An Unknown Hacker

“I could have done this for years and as long as I target random players and no one famous it would have gone without notice,”  Vizor The Threat Actor Who Did This Anti-cheat software is being used as a weapon by bad actors against their rivals. According to TechCrunch, the hacker going by the name …

Thousand Of Call Of Duty Player Were Mysteriously Banned By An Unknown Hacker Read More »

Schneider Electric Went Through A Brutal Data Breach : $125,000  In “Baguettes” Is The Ransom

Well, well, well The Hellcat ransomware group took advantage of Schneider Electric, a well-known French multinational corporation that produces energy and automation equipment ranging from home electrical components. In addition to over 400,000 rows of user data, it hacked and released over 40GB of compressed data that contained “compromised key data, including projects, issues, and …

Schneider Electric Went Through A Brutal Data Breach : $125,000  In “Baguettes” Is The Ransom Read More »

Microsoft SharePoint Vulnerability Leads To Exploitation Of Entire Corporate Network

Corporate networks are being initially accessed through the exploitation of CVE-2024-38094. As part of the July Patch Tuesday package, Microsoft discovered a Microsoft SharePoint remote code execution (RCE) vulnerability and classified it as “high-severity“. Rapid7 finds that attackers planted a webshell on a vulnerable SharePoint server by gaining unauthorised access through CVE-2024-38094. A Look On …

Microsoft SharePoint Vulnerability Leads To Exploitation Of Entire Corporate Network Read More »

Starhealth’s Data Was Leaked By RansomHub and is available in the Darkweb: 200 GB Of Data Leaked

The data from the ransomware attack on the Starhealth life insurance firm was leaked by the ransomhub gang and is currently accessible on the darkweb. Hacking blogs have been keeping an eye on the disclosed data. According to the data that was made public, the attack happened on October 19, 2024, at 07:09:13. Important information …

Starhealth’s Data Was Leaked By RansomHub and is available in the Darkweb: 200 GB Of Data Leaked Read More »

Facebook , Instagram And Other Popular Meta Platform Spreading Malware Through Ads

Ads campaign by cybercriminals is aimed at Facebook users. According to Bitdefender, they are using Meta’s advertising to copy trustworthy businesses to spread the SYS01 infostealer virus, which has the ability to take over accounts and personal data. Bitdefender Labs found a persistent assault that massively impersonates well-known brands like Netflix, Office 365, CapCut, and …

Facebook , Instagram And Other Popular Meta Platform Spreading Malware Through Ads Read More »

Scroll to Top