Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

cybersecurity, Cybersecurity News & Education, The Cyber Post

Interpol Busted 11 Members of Nigerian BEC Cybercrime Gang

0
By: Ravie Lakshmanan A coordinated law enforcement operation has resulted in the arrest of 11 members allegedly belonging to a Nigerian cybercrime gang notorious for...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Another Google Chrome 0-Day Bug Found Actively Exploited In-the-Wild

0
By: Ravie Lakshmanan Google has addressed yet another actively exploited zero-day in Chrome browser, marking the second such fix released by the company within a...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Data Leaked in Fertility Clinic Ransomware Attack

0
Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack.Reproductive Biology Associates says the data of approximately...

Learning & Cyber Education

Kaseya VSA Zero Day Exploit Explained

0
This article explains the pre-auth remote code execution exploit against Kaseya VSA Server that was used in the mass Revil ransomware attack on July 2nd,...

Breaches & Data Leaks

Can Data Protection Systems Prevent Data At Rest Leakage?

0
By: The Hacker News Protection against insider risks works when the process involves controlling the data transfer channels or examining data sources. One approach involves preventing...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
411FollowersFollow
10SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin (BTC)
$37,468.00
Ethereum (ETH)
$2,480.76
XRP (XRP)
$0.61
Litecoin (LTC)
$109.55
Bitcoin Cash (BCH)
$293.16
Stellar (XLM)
$0.198678
Monero (XMR)
$145.36
Tezos (XTZ)
$2.98
EOS (EOS)
$2.23
cybersecurity, Cybersecurity News & Education, The Cyber Post

WordPress XCloner 4.2.12 Remote Code Execution

0
Authored by Ron Jost WordPress XCloner plugin version 4.2.12 authenticated remote code execution exploit. advisories | CVE-2020-35948 Change Mirror Download # Exploit Title: Wordpress Plugin XCloner 4.2.12 -...
cybersecurity, Cybersecurity News & Education, The Cyber Post

i-Panel Administration System 2.0 Cross Site Scripting

0
Authored by Forster Chiu i-Panel Administration System version 2.0 suffers from a cross site scripting vulnerability. advisories | CVE-2021-41878 Change Mirror Download # Exploit Title: i-Panel Administration System...

Security & Hacking Tools

cybersecurity, Cybersecurity News & Education, The Cyber Post

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...
cybersecurity, Cybersecurity News & Education, The Cyber Post

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

cybersecurity, Cybersecurity News & Education, The Cyber Post

Backdoor.Win32.Wisell Remote Command Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Wisell malware suffers from a remote command execution vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2022Original source:...
cybersecurity, Cybersecurity News & Education, The Cyber Post

Ransomware Builder Babuk Insecure Permissions

0
Authored by malvuln | Site malvuln.com Ransomware Builder Babuk malware suffers from an insecure permissions vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2022Original...
cybersecurity, Cybersecurity News & Education, The Cyber Post

VMware vCenter Server Unauthenticated Log4Shell JNDI Injection Remote Code Execution

0
Authored by Spencer McIntyre, RageLtMan, jbaines-r7, w3bd3vil | Site metasploit.com VMware vCenter Server is affected by the Log4Shell vulnerability whereby a JNDI string can be...

Recent Tweets By The Cyber Post

Dear international media, when covering 🇺🇦, please remember, Ukrainians are not pawns in a geopolitical game. We are real people, 40 mln, with our agency, ideas and aspirations. Majority of us (~60%) want to join the EU&NATO. We are ready to resist Russia
https://cepa.org/ukraine-will-fight-and-ukraine-will-be-right/

BREAKING: The Pentagon says that Defense Secretary Lloyd Austin has put up to 8,500 troops on heightened alert, so they will be prepared to deploy if needed to reassure NATO allies in the face of ongoing Russian aggression on the border of Ukraine. http://apne.ws/e93ubwm

Load More...
Error decoding the Instagram API json