Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

Okta’s Recent Customer Support Data Breach Impacted 134 Customers

0
By: Nov 04, 2023NewsroomData Breach / Cyber Attack Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach...

Nation-State Hackers Caught Hiding Espionage Activities Behind Crypto Miners

0
By: Ravie Lakshmanan A nation-state actor known for its cyber espionage campaigns since 2012 is now using coin miner techniques to stay under the radar...

Researchers Warn of FontOnLake Rootkit Malware Targeting Linux Systems

0
By: Ravie Lakshmanan Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously unrecognized Linux malware that's engineered...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords

0
By: Ravie Lakshmanan French video game company Ubisoft on Friday confirmed it was a victim of a "cyber security incident," causing temporary disruptions to its...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
13SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Cyber Conflict Overshadowed a Major Government Ransomware Alert

0
As the cyber dimension of the Ukraine conflict erupted, demonstrating the ungoverned and unstable nature of full-on cyberwar, a parallel ransomware alert from the...

OpenEMR 6.0.0 Insecure Direct Object Reference

0
Authored by Allen Enosh Upputori OpenEMR version 6.0.0 suffers from an insecure direct object reference vulnerability. advisories | CVE-2021-40352 Change Mirror Download # Exploit Title: Openemr 6.0.0 -...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Nethserver 7 / 8 Cross Site Scripting

0
Authored by Andrea Intilangelo The NethServer module installed as WebTop, produced by Sonicle, is affected by a stored cross site scripting vulnerability due to insufficient...

Joomla 4.2.8 Information Disclosure

0
Authored by d4t4s3c Joomla versions 4.2.8 and below remote unauthenticated information disclosure exploit. advisories | CVE-2023-23752 Change Mirror Download #!/bin/bash# Exploit Title: Joomla! <= 4.2.8 - Unauthenticated Information...

CHAOS 5.0.8 Cross Site Scripting / Remote Command Execution

0
Authored by h00die, chebuya | Site metasploit.com CHAOS version 5.0.8 is a free and open-source Remote Administration Tool that allows generated binaries to control remote...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json