Cyber Vulnerabilities & Exploits

The latest hacker news

, Cybersecurity News & Education

North Koreas Built A Silent 7000 Strong Cyber Army

0
ELLEN IOANES, BUSINESS INSIDERJUN 17, 2020 10:06 AM EDT Editor's Note: This article originally appeared...
, Cybersecurity News & Education

Small & Medium Sized Businesses Targeted By Dharma Ransomware

0
Small and medium businesses (SMBs) are witnessing an increased ransomware attack globally, including in India, this year and the ransom demands have...
, Cybersecurity News & Education

Ukrainian Police Arrest Author of World’s Largest Phishing Service U-Admin

0
By: Ravie Lakshmanan Law enforcement officials in Ukraine, in coordination with authorities from the U.S. and Australia, last week shut down one of the world's...

Learning & Cyber Education

Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory

0
Continuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this...

Breaches & Data Leaks

Federal agency has suffered a successful espionage-related cyberattack

0
By: Tara Seals The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.

Cybercrime

Social Media Accounts

69FollowersFollow
173FollowersFollow
6SubscribersSubscribe
- Advertisement -
, Cybersecurity News & Education
, Cybersecurity News & Education

ZTE MF253V 1.0.0B04 XSS / CSRF / Hardcoded Password

0
Authored by T. Weber, S. Robertz | Site sec-consult.com ZTE WLAN router MF253V version 1.0.0B04 suffers from cross site request forgery, hardcoded password, outdated component,...

Security & Hacking Tools

, Cybersecurity News & Education

GitDorker – Scrape Secrets From GitHub Through Usage Of A Large Repository

0
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various...
, Cybersecurity News & Education

Pesidious – Malware Mutation Using Reinforcement Learning

0
Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate a...
, Cybersecurity News & Education

Hellraiser – CVE-Search Vulnerability Scanner

0
HellRaiser Vulnerability Scanner Install HellRaiser depends...
, Cybersecurity News & Education

Keepass – Secure Password Management

0
 KeePass Features Here are some "selling points" of KeePass. To get a first impression, you can also have a...
, Cybersecurity News & Education

OSSEC – A full platform to monitor and control your systems

0
OSSEC v3.6.0 Copyright (C) 2019 Trend Micro Inc. Information about OSSEC OSSEC is a full...

Daily Exploits

, Cybersecurity News & Education

CASAP Automated Enrollment System 1.1 SQL Injection

0
Authored by nu11secur1ty CASAP Automated Enrollment System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Change Mirror Download # Exploit Title:...
, Cybersecurity News & Education

Web Based Quiz System 1.0 Cross Site Scripting

0
Authored by Praharsh Kumar Singh Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability related to MCQ options. Change Mirror Download #...
, Cybersecurity News & Education

Backdoor.Win32.DarkKomet.irv Insecure Permissions

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.DarkKomet.irv malware suffers from an insecure permissions vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/341b2c3222122bd25c8509fc09534dec.txtContact:...

Offensive & Defensive Security Tools