Popular Podcasts

NVClient 5.0 Stack Buffer Overflow

0
Authored by Ahmet Umit Bayram NVClient version 5.0 suffers from a stack buffer overflow vulnerability. Change Mirror Download # Exploit Title: NVClient v5.0 - Stack Buffer Overflow...

Cyber Vulnerabilities & Exploits

The latest hacker news

North Korean Hackers Targeting Europe and Latin America with Updated DTrack Backdoor

0
By: Ravie Lakshmanan Hackers tied to the North Korean government have been observed using an updated version of a backdoor known as Dtrack targeting a...

Hackers Planted Fake Digital Evidence on Devices of Indian Activists and Lawyers

0
By: Ravie Lakshmanan A previously unknown hacking group has been linked to targeted attacks against human rights activists, human rights defenders, academics, and lawyers across...

Amazon Stops Largest DDoS Ever Recorded By Their Systems

0
Amazon says it mitigated the largest DDoS attack ever recorded By @JonPorty  Jun 18, 2020, 7:31am EDT An attack with a previously unseen volume of 2.3 Tbps Amazon Web...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Confidence in File Upload Security is Alarmingly Low. Why?

0
By: Nov 07, 2023The Hacker NewsWeb Security / Cyber Threat Numerous industries—including technology, financial services, energy, healthcare, and government—are rushing to incorporate cloud-based and...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
13SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Unusual Microsoft 365 Phishing Campaign Spoofs eFax Via Compromised Dynamics Voice Account

0
An elaborate and rather unusual phishing campaign is spoofing eFax notifications and using a compromised Dynamics 365 Customer Voice business account to lure victims...

DSL-124 Wireless N300 ADSL2+ Backup Disclosure

0
Authored by Aryan Chehreghani DSL-124 Wireless N300 ADSL2+ suffers from a backup disclosure vulnerability. Change Mirror Download # Exploit Title: DSL-124 Wireless N300 ADSL2+ - Backup File...

‘There are over $100 billion lost in crypto,’ says KeychainX CEO

0
With the growing number of wallets, blockchains and users the industry sees every month, the question of security becomes a top priority for the...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

PPDB ONLINE 1.3 Administrative Page Disclosure

0
Authored by indoushka PPDB ONLINE version 1.3 appears to suffer from an administrative page disclosure issue. Change Mirror Download ====================================================================================================================================| # Title :...

Quick Job 2.4 Insecure Direct Object Reference

0
Authored by indoushka Quick Job version 2.4 suffers from an insecure direct object reference vulnerability. Change Mirror Download ====================================================================================================================================| # Title : Quick...

LMS ZAI 6.1 Insecure Settings

0
Authored by indoushka LMS ZAI version 6.1 suffers from an ignored default credential vulnerability. Change Mirror Download ====================================================================================================================================| # Title : LMS ZAI...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json