Popular Podcasts

EU regulator investigates Facebook for its 533M users’ data leak

An Irish regulator said on Tuesday it is investigating a recent Facebook data leak when 533M users’ data, such as phone numbers and locations,...

Cyber Vulnerabilities & Exploits

The latest hacker news

Google: We’re Tracking 270 State-Sponsored Hacker Groups From Over 50 Countries

By: Ravie Lakshmanan Google's Threat Analysis Group (TAG) on Thursday said it's tracking more than 270 government-backed threat actors from more than 50 countries, adding...

How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service

By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service NSW – a website offering...

Emotet Botnet’s Latest Resurgence Spreads to Over 100,000 Computers

By: Ravie Lakshmanan The insidious Emotet botnet, which staged a return in November 2021 after a 10-month-long hiatus, is once again exhibiting signs of steady...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

By: Dec 23, 2022Ravie LakshmananPassword Management / Data Breach The August 2022 security breach of LastPass may have been more severe than previously disclosed by...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Name Price
Bitcoin Cash(BCH)

Voice authentication taking hold.

Voice authentication taking hold. Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about...

SolarWinds spurs investment in threat hunting, supplier vetting

By: Derek B. Johnson Organizations that boosted security budgets in response to the...

Uber sustains a major data breach. Notes on the underworld. A large DDoS attack...

Uber sustains a major data breach. Notes on the underworld. A large DDoS attack is stopped in Eastern Europe. An FBI alert and a...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

LRMS PHP 1.0 SQL Injection / Shell Upload

Authored by nu11secur1ty LRMS PHP version 1.0 suffers from remote shell upload and multiple remote SQL injection vulnerabilities. Change Mirror Download ## Titles: LRMS-PHP-by-oretnom23-v1.0 hat-trick1. Multiple-SQLi2. File...

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json