Popular Podcasts

FTC to Go After Companies that Ignore Log4j

Companies that fail to protect consumer data from Log4J attacks are at risk of facing Equifax-esque legal action and fines, the FTC warned. The...

Cyber Vulnerabilities & Exploits

The latest hacker news

New Backdoor Created Using Leaked CIA’s Hive Malware Discovered in the Wild

By: Jan 16, 2023Ravie LakshmananThreat Landscape / Malware Unidentified threat actors have deployed a new backdoor that borrows its features from the U.S. Central Intelligence...

New BLISTER Malware Using Code Signing Certificates to Evade Detection

By: Ravie Lakshmanan Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security...

Nearly 18,000 SolarWinds Customers Installed Backdoored Software

By: Ravie Lakshmanan SolarWinds, the enterprise monitoring software provider which found itself at the epicenter of the most consequential supply chain attacks, said as many...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident

By: Mar 25, 2023Ravie LakshmananArtificial Intelligence / Data Security OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Name Price
Bitcoin (BTC)
Ethereum (ETH)
Litecoin (LTC)
Monero (XMR)
Stellar (XLM)
Bitcoin Cash (BCH)
Tezos (XTZ)

Top Threats your Business Can Prevent on the DNS Level

Web-filtering solutions, a must-have for businesses of any size, will protect your corporate network from multiple origins. The Domain Name System (DNS) is the...

GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers

Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many from countries where pot is illegal. A database linked to GrowDiaries, an online...

WordPress Slider Revolution 4.x.x Shell Upload

Authored by indoushka WordPress Slider Revolution plugin versions 4.x.x suffer from a remote shell upload vulnerability. Change Mirror Download =================================================================================================| # Title :...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

WordPress Theme My Login 2FA Brute Force

Authored by Joost Grunwald | Site iecetee.com WordPress Theme My Login 2FA plugin versions prior to 1.2 suffer from a brute forcing vulnerability. Change Mirror Download The...

Lamano CMS 2.0 Cross Site Request Forgery

Authored by indoushka Lamano CMS version 2.0 suffers from a cross site request forgery vulnerability. Change Mirror Download ====================================================================================================================================| # Title : Lamano...

Luxcal Event Calendar 3.2.3 Cross Site Request Forgery

Authored by indoushka Luxcal Event Calendar version 3.2.3 suffers from a cross site request forgery vulnerability. Change Mirror Download ====================================================================================================================================| # Title :...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json