Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

The Rise of the Rookie Hacker – A New Trend to Reckon With

0
By: î ‚Dec 21, 2022î „The Hacker NewsThreat Detection and Response More zero knowledge attacks, more leaked credentials, more Gen-Z cyber crimes - 2022 trends and 2023...

Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyber Attacks

0
By: î ‚Feb 14, 2024î „NewsroomArtificial Intelligence / Cyber Attack Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and...

Rapid7 Source Code Breached in Codecov Supply-Chain Attack

0
By: Ravie Lakshmanan Cybersecurity company Rapid7 on Thursday revealed that unidentified actors improperly managed to get hold of a small portion of its source code...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

JumpCloud Resets API Keys Amid Ongoing Cybersecurity Incident

0
By: î ‚Jul 07, 2023î „Swati KhandelwalSecurity Incident / API Security JumpCloud, a provider of cloud-based identity and access management solutions, has swiftly reacted to an ongoing...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Xerte 3.9 Remote Code Execution

0
Authored by Rik Lutz Xerte versions 3.9 and below suffer from a remote code execution vulnerability. advisories | CVE-2021-44664 Change Mirror Download # Exploit Title: Xerte 3.9 -...

Home Clean Service System 1.0 SQL Injection

0
Authored by nu11secur1ty Home Clean Service System version 1.0 suffers from a remote SQL injection vulnerability. Change Mirror Download ## Title: Home Clean Service System v1.0 -...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Gambio Online Webshop 4.9.2.0 Remote Code Execution

0
Authored by h00die-gr3y, usd Herolab | Site metasploit.com A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json