Popular Podcasts

Sherpa Connector Service 2020.2.20328.2050 Unquoted Service Path

Authored by Harshit, Manthan Chhabra Sherpa Connector Service version 2020.2.20328.2050 suffers from an unquoted service path vulnerability. advisories | CVE-2022-23909 Change Mirror Download # Exploit Title: Sherpa...

Cyber Vulnerabilities & Exploits

The latest hacker news

Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware

By: Feb 08, 2023Ravie LakshmananCryptocurrency / Endpoint Security A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and...

Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners

By: Ravie Lakshmanan A recently patched critical security flaw in Atlassian Confluence Server and Data Center products is being actively weaponized in real-world attacks to...

Chinese Hackers Targeting European Entities with New MQsTTang Backdoor

By: Mar 03, 2023Ravie LakshmananThreat Intelligence / Cyber Attack The China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

By: The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Name Price
Bitcoin Cash(BCH)

Real Big Phish: Mobile Phishing & Managing User Fallibility

Phishing is more successful than ever. Daniel Spicer, CSO of Ivanti, discusses emerging trends in phishing, and using zero-trust security to patch the human...

Vacation Rental Script 1.8 Cross Site Scripting

Authored by CraCkEr Vacation Rental Script version 1.8 suffers from a cross site scripting vulnerability. Change Mirror Download ┌┌───────────────────────────────────────────────────────────────────────────────────────┐││ ...
dark reading threat intel and cybersecurity news

Phishing Simulation Study Shows Why These Attacks Remain Pervasive

A simulated phishing attack against more than 82,000 workers found that e-mails with a personal impact resulted in more clicks and that technical teams...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Automatic-Systems SOC FL9600 FastLine Directory Traversal

Authored by Marcin Kozlowski, Mike Jankowski-Lorek Automatic-Systems SOC FL9600 FastLine version V06 suffers from a directory traversal vulnerability. advisories | CVE-2023-37607 Change Mirror Download # Exploit Title: Automatic-Systems...

Automatic-Systems SOC FL9600 FastLine Hardcoded Credentials

Authored by Marcin Kozlowski, Mike Jankowski-Lorek Automatic-Systems SOC FL9600 FastLine version V06 has hardcoded credentials for super admin functionality. advisories | CVE-2023-37608 Change Mirror Download # Exploit Title:...

perl2exe 30.10C Arbitrary Code Execution

Authored by decrazyo Executables created with perl2exe versions 30.10C and below suffer from an arbitrary code execution vulnerability. Change Mirror Download # Exploit Title: Executables Created with...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json