Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

By: Ravie Lakshmanan Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a...

Freshly scraped LinkedIn data of 88,000 US business owners shared online

About a week after scraped data from more than 700 million LinkedIn profiles were put for sale online, it seems that threat actors have...

MobiFriends Dating App Breached – 3.5 Million Credentials Leaked

The messages, hashed passwords and usernames of 3.5 million clients of the dating application MobiFriends were posted and available to be purchased on an...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Chinese Hackers Believed to be Behind Second Cyberattack on Air India

By: Ravie Lakshmanan Even as a massive data breach affecting Air India came to light the previous month, India's flag carrier airline appears to have...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Name Price
Bitcoin (BTC)
Ethereum (ETH)
Litecoin (LTC)
Monero (XMR)
Stellar (XLM)
Bitcoin Cash (BCH)
Tezos (XTZ)

Backdoor.Win32.Neakse.bit Insecure Permissions

Authored by malvuln | Site malvuln.com Backdoor.Win32.Neakse.bit malware suffers from an insecure permissions vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/20863ba09c31037b1b3220fc6da100e1.txtContact:...

Sipwise C5 NGCP CSC Cross Site Scripting

Authored by LiquidWorm | Site zeroscience.mk Sipwise software platform suffers from multiple authenticated stored and reflected cross site scripting vulnerabilities when input passed via several...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

FusionInvoice 2023-1.0 Cross Site Scripting

Authored by Andrea Intilangelo FusionInvoice version 2023-1.0 suffers from a persistent cross site scripting vulnerability. advisories | CVE-2023-25439 Change Mirror Download # Exploit Title: FusionInvoice 2023-1.0 - Stored...

Service Provider Management System 1.0 SQL Injection

Authored by Ashik Kunjumon Service Provider Management System version 1.0 suffers from a remote SQL injection vulnerability. Change Mirror Download # Exploit Title: Service Provider Management System...

WFTPD 3.25 Credential Disclosure

Authored by golem445 WFTPD version 3.25 leaves credentials accessible in wftpd.ini. Change Mirror Download # Exploit Title: WFTPD 3.25 - Unprotected Credential Storage# Date: 04/01/2023# Exploit Author:...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.

Error decoding the Instagram API json