Popular Podcasts

Russia-linked Hydra, the world’s largest darknet marketplace, shut down and seized

0
Authorities seized the infrastructure of the infamous marketplace, with the US Treasury sanctioning the entity together with crypto exchange Garantex. German authorities announced the seizure...

Cyber Vulnerabilities & Exploits

The latest hacker news

cybersecurity, Cybersecurity News & Education, The Cyber Post

Cyber espionage by Chinese hackers in neighbouring nations is on the rise

0
By: Ravie Lakshmanan A string of cyber espionage campaigns dating all the way back to 2014 and focused on gathering military intelligence from neighbouring countries...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Cybercriminals Abusing Legitimate Windows Programs

0
Cybercriminals Abuse Built-in Services to Target Windows Cybercriminals are now abusing inbuilt legitimate services of Windows to perform fileless attacks. Researchers reveal they use spear-phishing...

Learning & Cyber Education

Kaseya VSA Zero Day Exploit Explained

0
This article explains the pre-auth remote code execution exploit against Kaseya VSA Server that was used in the mass Revil ransomware attack on July 2nd,...

Breaches & Data Leaks

Researchers Detail Modus Operandi of ShinyHunters Cyber Crime Group

0
By: Ravie Lakshmanan ShinyHunters, a notorious cybercriminal underground group that's been on a data breach spree since last year, has been observed searching companies' GitHub...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
460FollowersFollow
11SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin (BTC)
$30,392.00
Ethereum (ETH)
$2,071.37
XRP (XRP)
$0.435904
Litecoin (LTC)
$72.31
Bitcoin Cash (BCH)
$205.24
Stellar (XLM)
$0.138412
Monero (XMR)
$172.99
Tezos (XTZ)
$1.83
EOS (EOS)
$1.36
cybersecurity, Cybersecurity News & Education, The Cyber Post

Umbraco 8.14.1 Server-Side Request Forgery

0
Authored by NgoAnhDuc Umbraco version 8.14.1 suffers from a server-side request forgery vulnerability. Change Mirror Download # Exploit Title: Umbraco v8.14.1 - 'baseUrl' SSRF# Date: July 5,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

This Week in Database Leaks: Cognyte, CVS, Wegmans

0
Billions of records were found exposed this week due to unprotected databases owned by major corporations and third-party providers.Unsecured cloud-based databases continue to threaten...

Security & Hacking Tools

cybersecurity, Cybersecurity News & Education, The Cyber Post

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

cybersecurity, Cybersecurity News & Education, The Cyber Post

Zyxel Firewall ZTP Unauthenticated Command Injection

0
Authored by jbaines-r7 | Site metasploit.com This Metasploit module exploits CVE-2022-30525, an unauthenticated remote command injection vulnerability affecting Zyxel firewalls with zero touch provisioning (ZTP)...
cybersecurity, Cybersecurity News & Education, The Cyber Post

SolarView Compact 6.0 Command Injection

0
Authored by Ahmed Alroky SolarView Compact version 6.0 suffers from a command injection vulnerability. advisories | CVE-2022-29303 Change Mirror Download # Exploit Title: SolarView Compact 6.0 - OS...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Survey Sparrow Enterprise Survey Software 2022 Cross Site Scripting

0
Authored by Pankaj Kumar Thakur Survey Sparrow Enterprise Survey Software 2022 suffers from a persistent cross site scripting vulnerability. advisories | CVE-2022-29727 Change Mirror Download # Exploit Title:...

Recent Tweets By The Cyber Post

Malicious PDF Generator☠️ (Great for Red Teaming)
-
Generate multiple pdf files with phone-home functionality. Can be used with Burp Collaborator or http://Interact.sh
-
Repo: https://github.com/jonaslejon/malicious-pdf
-
Creator: @jonasl
-
#CyberSecurity #infosec #bugbounty #CTF

RCE in Sophos Firewall (CVE-2022-1040)
Cc @Dinosn @ExWareLabs

curl -sk -H "X-Requested-With: XMLHttpRequest" -X POST 'hxxps://x.x.x.x/userportal/Controller?mode=8700&operation=1&datagrid=179&json=\{"x":"test"\}' | grep -q 'Session Expired'

Load More...
Error decoding the Instagram API json