Popular Podcasts

WordPress wpDiscuz 7.0.4 Shell Upload

0
Authored by Hoa Nguyen, Chloe Chamberland | Site metasploit.com This Metasploit module exploits an arbitrary file upload in the WordPress wpDiscuz plugin versions from 7.0.0...

Cyber Vulnerabilities & Exploits

The latest hacker news

cybersecurity, Cybersecurity News & Education, The Cyber Post

Microsoft Office Users Warned on New Malware-Protection Bypass

0
Word and Excel documents are enlisted to disable Office macro warnings, so the Zloader banking malware can be downloaded onto systems without security tools...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Safari Zero-Day Used in Malicious LinkedIn Campaign

0
Researchers shed light on how attackers exploited Apple web browser vulnerabilities to target government officials in Western Europe. Threat actors used a Safari zero-day...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Largest Attack On health Services firm UHS by Ryuk Ransomware

0
The Ryuk ransomware is suspected to be the culprit. A ransomware attack has shut down Universal Health Services, a Fortune-500 owner of a nationwide network...

Learning & Cyber Education

Kaseya VSA Zero Day Exploit Explained

0
This article explains the pre-auth remote code execution exploit against Kaseya VSA Server that was used in the mass Revil ransomware attack on July 2nd,...

Breaches & Data Leaks

The Biggest Data Breaches In The First Half of 2020

0
In this blog, we are going to talk about the big data breach that occurred in the first half of 2020.  Since the COVID-19 pandemic...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
398FollowersFollow
10SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin (BTC)
$56,936.00
Ethereum (ETH)
$4,319.51
XRP (XRP)
$0.97
Litecoin (LTC)
$199.11
Bitcoin Cash (BCH)
$567.74
Stellar (XLM)
$0.326721
Tezos (XTZ)
$5.05
Monero (XMR)
$235.06
EOS (EOS)
$3.94
cybersecurity, Cybersecurity News & Education, The Cyber Post

Trixbox 2.8.0.4 Remote Code Execution

0
Authored by Ron Jost Trixbox version 2.8.0.4 has an OS command injection vulnerability that can be leveraged via shell metacharacters in the lang parameter to...
cybersecurity, Cybersecurity News & Education, The Cyber Post

URVE Software Build 24.03.2020 Authentication Bypass / Remote Code Execution

0
Authored by Erik Steltzner | Site sec-consult.com URVE Software build version 24.03.2020 suffers from an authentication bypass that allows for remote code execution. advisories | CVE-2020-29552 Change...

Security & Hacking Tools

cybersecurity, Cybersecurity News & Education, The Cyber Post

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

cybersecurity, Cybersecurity News & Education, The Cyber Post

CMSimple 5.4 Local File Inclusion / Remote Code Execution

0
Authored by S1lv3r CMSimple version 5.4 local file inclusion to remote code execution exploit. Change Mirror Download # Exploit Title: CMSimple 5.4 - Local file inclusion (LFI)...
cybersecurity, Cybersecurity News & Education, The Cyber Post

HTTPDebuggerPro 9.11 Unquoted Service Path

0
Authored by Aryan Chehreghani HTTPDebuggerPro version 9.11 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: HTTPDebuggerPro 9.11 - Unquoted Service Path# Exploit...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Apple ColorSync CMMNDimLinear::Interpolate Uninitialized Memory

0
Authored by Google Security Research, mjurczyk Apple ColorSync suffers from a use of uninitialized memory in CMMNDimLinear::Interpolate. advisories | CVE-2021-30917

Recent Tweets By The Cyber Post

My next paper is finally here, this time on TA406 🇰🇵, also known as Konni Group and sometimes referred to as Kimsuky. TA406 has connections to TA408, TA427, and at least 3 DPRK-related UNKs that Proofpoint tracks. https://www.proofpoint.com/us/blog/threat-insight/triple-threat-north-korea-aligned-ta406-scams-spies-and-steals

I wanted a way to monitor trending CVEs on Twitter

So I built http://CVEtrends.com

- data comes from Twitter + NIST NVD APIs
- back-end: Python, Flask, PostgreSQL, and Redis
- front-end: React + Bootstrap

It's a quick MVP, but let me know your thoughts and feedback...

Load More...
Error decoding the Instagram API json