Popular Podcasts

Russia Lays Groundwork for Cyberattacks on US Infrastructure – White House

0
“Evolving intelligence” shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House said — but researchers warn that many orgs...

Cyber Vulnerabilities & Exploits

The latest hacker news

Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware

0
By: Ravie Lakshmanan Microsoft on Thursday warned of a "massive email campaign" that's pushing a Java-based STRRAT malware to steal confidential data from infected systems...

CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

0
Mar 26, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities...

A Data Exfiltration Attack Scenario: The Porsche Experience

0
By: As part of Checkmarx's mission to help organizations develop and deploy secure software, the Security Research team started looking at the security posture...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Australia Passes Bill to Fine Companies up to $50 Million for...

0
By: Ravie Lakshmanan The Australian government has passed a bill that markedly increases the penalty for companies suffering from serious or repeated data breaches. To that...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$63,537.00
Ethereum(ETH)
$3,127.10
XRP(XRP)
$0.52
Bitcoin Cash(BCH)
$474.95
Litecoin(LTC)
$83.60
Stellar(XLM)
$0.112879
Monero(XMR)
$118.82
Tezos(XTZ)
$1.01
EOS(EOS)
$0.85

Binance recovers the majority of funds stolen from Curve Finance

0
Crypto exchange Binance has recovered a big part of the funds from the recent hack that targeted the decentralized finance (DeFi) protocol Curve Finance. In...

Worm.Win32.Busan.k Insecure Transit

0
Authored by malvuln | Site malvuln.com Worm.Win32.Busan.k malware suffers from an insecure transit vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/bcad7aa6cb6cb9d94377cd88acbca1c9.txtContact:...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

LRMS PHP 1.0 SQL Injection / Shell Upload

0
Authored by nu11secur1ty LRMS PHP version 1.0 suffers from remote shell upload and multiple remote SQL injection vulnerabilities. Change Mirror Download ## Titles: LRMS-PHP-by-oretnom23-v1.0 hat-trick1. Multiple-SQLi2. File...

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json