Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

Okta’s Recent Customer Support Data Breach Impacted 134 Customers

By: Nov 04, 2023NewsroomData Breach / Cyber Attack Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach...

Nation-State Hackers Caught Hiding Espionage Activities Behind Crypto Miners

By: Ravie Lakshmanan A nation-state actor known for its cyber espionage campaigns since 2012 is now using coin miner techniques to stay under the radar...

Researchers Warn of FontOnLake Rootkit Malware Targeting Linux Systems

By: Ravie Lakshmanan Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously unrecognized Linux malware that's engineered...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords

By: Ravie Lakshmanan French video game company Ubisoft on Friday confirmed it was a victim of a "cyber security incident," causing temporary disruptions to its...


Follow Us and Subscribe to Our Social Media


Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Cyber Conflict Overshadowed a Major Government Ransomware Alert

As the cyber dimension of the Ukraine conflict erupted, demonstrating the ungoverned and unstable nature of full-on cyberwar, a parallel ransomware alert from the...

OpenEMR 6.0.0 Insecure Direct Object Reference

Authored by Allen Enosh Upputori OpenEMR version 6.0.0 suffers from an insecure direct object reference vulnerability. advisories | CVE-2021-40352 Change Mirror Download # Exploit Title: Openemr 6.0.0 -...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Nethserver 7 / 8 Cross Site Scripting

Authored by Andrea Intilangelo The NethServer module installed as WebTop, produced by Sonicle, is affected by a stored cross site scripting vulnerability due to insufficient...

Joomla 4.2.8 Information Disclosure

Authored by d4t4s3c Joomla versions 4.2.8 and below remote unauthenticated information disclosure exploit. advisories | CVE-2023-23752 Change Mirror Download #!/bin/bash# Exploit Title: Joomla! <= 4.2.8 - Unauthenticated Information...

CHAOS 5.0.8 Cross Site Scripting / Remote Command Execution

Authored by h00die, chebuya | Site metasploit.com CHAOS version 5.0.8 is a free and open-source Remote Administration Tool that allows generated binaries to control remote...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json