Popular Podcasts

WordPress Fitness Calculators 1.9.5 Cross Site Request Forgery

0
Authored by 0xB9 WordPress Fitness Calculators plugin version 1.9.5 suffers from a cross site request forgery vulnerability. advisories | CVE-2021-24272 Change Mirror Download # Exploit Title: WordPress Plugin...

Cyber Vulnerabilities & Exploits

The latest hacker news

cybersecurity, Cybersecurity News & Education, The Cyber Post

Russian Who Hacked LinkedIn, Dropbox Sentenced to 7 Years in Prison

0
By: Swati Khandelwal A Russian hacker who was found guilty of hacking LinkedIn, Dropbox, and Formspring over eight years ago has finally been sentenced to...
cybersecurity, Cybersecurity News & Education, The Cyber Post

REvil Ransomware Gang Mysteriously Disappears After High-Profile Attacks

0
By: Ravie Lakshmanan REvil, the infamous ransomware cartel behind some of the biggest cyberattacks targeting JBS and Kaseya, has mysteriously disappeared from the dark web,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Chinese APT Hackers Target Southeast Asian Government Institutions

0
By: Ravie Lakshmanan Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe...

Learning & Cyber Education

Kaseya VSA Zero Day Exploit Explained

0
This article explains the pre-auth remote code execution exploit against Kaseya VSA Server that was used in the mass Revil ransomware attack on July 2nd,...

Breaches & Data Leaks

Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server

0
By: Ravie Lakshmanan The maintainers of Jenkins—a popular open-source automation server software—have disclosed a security breach after unidentified threat actors gained access to one of...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
381FollowersFollow
10SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin (BTC)
$59,790.00
Ethereum (ETH)
$3,988.22
XRP (XRP)
$1.07
Litecoin (LTC)
$187.12
Bitcoin Cash (BCH)
$611.62
Stellar (XLM)
$0.373157
Tezos (XTZ)
$6.33
Monero (XMR)
$272.17
EOS (EOS)
$4.73
cybersecurity, Cybersecurity News & Education, The Cyber Post

Critical Cisco Bug in VPN Routers Allows Remote Takeover

0
Security researchers warned that at least 8,800 vulnerable systems are open to compromise. A critical security vulnerability in a subset of Cisco Systems’ small-business VPN...
cybersecurity, Cybersecurity News & Education, The Cyber Post

US Urges Organizations to Implement MFA, Other Controls to Defend Against Russian Attacks

0
Actors working for Moscow's Foreign Intelligence Service are actively targeting organizations in government and other sectors, FBI and DHS say.The FBI, the Department of...

Security & Hacking Tools

cybersecurity, Cybersecurity News & Education, The Cyber Post

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

cybersecurity, Cybersecurity News & Education, The Cyber Post

WordPress Enfold Theme 4.8.3 Cross Site Scripting

0
Authored by Francisco Diaz-Pache Alonso, Sergio Corral Cristo, David Alvarez Robles WordPress Enfold theme version 4.8.3 suffers from a cross site scripting vulnerability. advisories | CVE-2021-24719 Change...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Macro Expert 4.7 Unquoted Service Path

0
Authored by Mert Das Macro Expert version 4.7 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: Macro Expert 4.7 - Unquoted Service...
cybersecurity, Cybersecurity News & Education, The Cyber Post

SonicWall SMA 10.2.1.0-17sv Password Reset

0
Authored by Jacob Baines SonicWall SMA version 10.2.1.0-17sv suffers from a remote password reset vulnerability. advisories | CVE-2021-20034 Change Mirror Download # Exploit Title: SonicWall SMA 10.2.1.0-17sv -...

Recent Tweets By The Cyber Post

#HorizonProtocol is a borderless financial market for synthetic assets.🌐

As a DeFi protocol, $HZN issues derivatives and creates on-chain synthetic assets representing the real economy.💪🚀

➡️https://horizonprotocol.com

#BSC #DeFi #PancakeSwap $CAKE #BNB #BinanceSmartChain

REvil ransomware disappears after Tor services hijacked

#cybersecurity #ransomware #joke #news #cyber #revil

https://thecyberpost.com/news/cybercrime/ransomware/revil-ransomware-disappears-after-tor-services-hijacked/ via @thecyberpost1

$5.2 billion in BTC transactions tied to top 10 ransomware variants: US Treasury https://thecyberpost.com/news/security/5-2-billion-in-btc-transactions-tied-to-top-10-ransomware-variants-us-treasury/

#ransomware #finance #fincen #top10 #billions #usd #bitcoin #monero #crypto

Load More...
Error decoding the Instagram API json