Popular Podcasts

HugBunter is Requesting Proof-of-Life from Onion Service Admins

0
The administrator of the largest darkweb forum, Dread, is requesting proof-of-life messages from the administrators of markets, forums, and other onion services.HugBunter, the owner...

Cyber Vulnerabilities & Exploits

The latest hacker news

Custom trojan stole data from 3 million Windows devices – analysis

0
Major data leaks have become almost routine news around the globe. Researchers at NordLocker claim to have detected yet another breach with 1.2 TB...

EU regulator investigates Facebook for its 533M users’ data leak

0
An Irish regulator said on Tuesday it is investigating a recent Facebook data leak when 533M users’ data, such as phone numbers and locations,...

Google Researchers Discover A New Variant of Rowhammer Attack

0
By: Ravie Lakshmanan A team of security researchers from Google has demonstrated yet another variant of the Rowhammer attack that bypasses all current defenses to...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

0
By: Ravie Lakshmanan Dutch authorities on Friday announced the arrest of a software developer in Amsterdam who is alleged to be working for Tornado Cash,...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$65,157.00
Ethereum(ETH)
$3,379.64
XRP(XRP)
$0.60
Bitcoin Cash(BCH)
$370.98
Litecoin(LTC)
$81.04
Stellar(XLM)
$0.123997
Monero(XMR)
$137.90
Tezos(XTZ)
$1.19
EOS(EOS)
$0.93

Docker Container Escape

0
Authored by Christophe de la Fuente, Spencer McIntyre, Nick Frichette, Borys Poplawski, Adam Iwaniuk | Site metasploit.com This Metasploit module leverages a flaw in runc...

jQuery UI 1.12.1 Denial Of Service

0
Authored by Rafael Cintra Lopes jQuery UI version 1.12.1 suffers from a denial of service vulnerability. advisories | CVE-2020-28488 Change Mirror Download # Exploit Title: jQuery UI 1.12.1...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Checkmk Agent 2.0.0 / 2.1.0 / 2.2.0 Local Privilege Escalation

0
Authored by Michael Baer | Site sec-consult.com Checkmk Agent versions 2.0.0, 2.1.0, and 2.2.0 suffer from a local privilege escalation vulnerability. advisories | CVE-2024-06070 Change Mirror Download SEC...

Membership Management System 1.0 SQL Injection / Shell Upload

0
Authored by SoSPiro Membership Management System version 1.0 suffers from remote shell upload and remote SQL injection vulnerabilities. Change Mirror Download from requests_toolbelt.multipart.encoder import MultipartEncoderimport requestsimport stringimport...

HALO 2.13.1 CORS Issue

0
Authored by nu11secur1ty HALO version 2.13.1 has an insecure cross-origin resource sharing setting that allows an arbitrary origin. Change Mirror Download ## Title: HALO-2.13.1 Cross-origin resource sharing:...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json