Popular Podcasts

SolarWinds Hackers Breach Microsoft Customer Support to Target its Customers

By: Ravie Lakshmanan In yet another sign that the Russian hackers who breached SolarWinds network monitoring software to compromise a slew of entities never really...

Cyber Vulnerabilities & Exploits

The latest hacker news

22-Year-Old Charged With Hacking Water System and Endangering Lives

By: Ravie Lakshmanan A 22-year-old man from the U.S. state of Kansas has been indicted on charges that he unauthorizedly accessed a public water facility's...

Does Your Help Desk Know Who’s Calling?

By: Mar 09, 2023The Hacker NewsPassword Security / Enterprise Security Phishing, the theft of users' credentials or sensitive data using social engineering, has been a...

A New Hacking Group Hitting Russian Companies With Ransomware

By: Ravie Lakshmanan As ransomware attacks against critical infrastructure continue to spike in recent months, cybersecurity researchers have uncovered a new entrant that has been...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

India’s Newest Airline Akasa Air Found Leaking Passengers’ Personal Information

By: Ravie Lakshmanan Akasa Air, India's newest commercial airline, exposed the personal data belonging to its customers that the company blamed on a technical configuration...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Name Price
Bitcoin (BTC)
Ethereum (ETH)
Litecoin (LTC)
Monero (XMR)
Stellar (XLM)
Bitcoin Cash (BCH)
Tezos (XTZ)

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

WordPress Watu Quiz 3.3.9 / GN Publisher 1.5.5 / Japanized For WooComerce 2.5.4 XSS

Authored by Marco Wotschka | Site wordfence.com WordPress plugins Watu Quiz versions 3.3.9 and below, GN Publisher versions 1.5.5 and below, and Japanized For WooCommerce...

Monitorr 1.7.6m / 1.7.7d Remote Code Execution

Authored by h00die-gr3y, Lyhins Lab | Site metasploit.com This Metasploit module exploits an arbitrary file upload vulnerability and achieves remote code execution in the Monitorr...

Linksys AX3200 1.1.00 Command Injection

Authored by Ahmed Alroky Linksys AX3200 version 1.1.00 suffers from a remote command injection vulnerability. advisories | CVE-2022-38841 Change Mirror Download # Exploit Title: Linksys AX3200 V1.1.00 -...

Recent Tweets By The Cyber Post

The team at @OpenAI just fixed a critical account takeover vulnerability I reported few hours ago affecting #ChatGPT.

It was possible to takeover someone's account, view their chat history, and access their billing information without them ever realizing it.

Breakdown below 👇

A RedTeam Toolkit

ARTToolkit is an interactive cheat sheet, containing an useful list of offensive security tools and their respective commands/payloads, to be used in red teaming exercises.


Find the project at:

… https://t.me/hackgit/8015

BTC-E funds are on the move.

#btc #Bitcoin


Load More...
Error decoding the Instagram API json