Popular Podcasts

Developments in cyber gangland, and the increasingly complicated entanglement of crooks...

0
Developments in cyber gangland, and the increasingly complicated entanglement of crooks and spies. Selling confiscated alt-coin to compensate fraud victims. Red Curl is a Russophone...

Cyber Vulnerabilities & Exploits

The latest hacker news

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia

0
Cybercriminals have developed an enhanced version of the infamous GhostLocker ransomware that they are deploying in attacks across the Middle East, Africa, and Asia.Two...

Crypto Stealing Chrome Extensions Discovered

0
A security researcher discovered another 22 Google Chrome web browser extensions that tried to steal users’ cryptocurrencies. A security researcher has discovered another 22 Google...

Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks

0
By: Ravie Lakshmanan Cybersecurity company Imperva on Friday said it recently mitigated a ransom distributed denial-of-service (DDoS) attack targeting an unnamed website that peaked at...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

New KV-Botnet Targeting Cisco, DrayTek, and Fortinet Devices for Stealthy Attacks

0
By: Dec 15, 2023NewsroomBotnet / Advanced Persistent Threat A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is being used...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
13SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

New MacOS Malware ‘DazzleSpy’ Used in Watering-Hole Attacks

0
A pro-democracy Hong Kong site was used to launch watering-hole attacks that planted a powerful macOS backdoor that researchers dubbed DazzleSpy. A new family of...

macOS AppleVADriver Out-Of-Bounds Write

0
Authored by Ivan Fratric, Google Security Research macOS suffers from an out-of-bounds write vulnerability in AppleVADriver when decoding mpeg2 videos. advisories | CVE-2023-42882

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

SPA-CART CMS 1.9.0.6 Username Enumeration / Business Logic Flaw

0
Authored by Andrey Stoykov SPA-CART CMS version 1.9.0.6 suffers from business logic and user enumeration flaws. Change Mirror Download # Exploit Title: Business Logic Flaw and Username...

Backdoor.Win32.Plugx MVID-2024-0686 Insecure Permissions

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Plugx malware suffers from an insecure permissions vulnerability. Change Mirror Download Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original...

Microweber 2.0.15 Cross Site Scripting

0
Authored by tmrswrr Microweber version 2.0.15 suffers from a persistent cross site scripting vulnerability. Change Mirror Download # Exploit Title: Stored XSS in Microweber# Date: 06/18/2024# Exploit...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json