Popular Podcasts

Backdoor.Win32.Wollf.16 Authentication Bypass

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Wollf.16 malware suffers from an authentication bypass vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2022Original source: https://malvuln.com/advisory/204613443e555f73237ea43a2faecaa5.txtContact:...

Cyber Vulnerabilities & Exploits

The latest hacker news

dark reading threat intel and cybersecurity news

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

0
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2021-29221PUBLISHED: 2021-04-09 A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an...

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection

0
By: Ravie Lakshmanan Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every...

Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise

0
By: The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

34 Cybercriminals Arrested in Spain for Multi-Million Dollar Online Scams

0
By: î ‚Oct 24, 2023î „NewsroomCyber Fraud / Cyber Crime Spanish law enforcement officials have announced the arrest of 34 members of a criminal group that carried...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
13SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Technical Advisory: Pulse Connect Secure – Arbitrary File Read via Logon Message (CVE-2020-8255)

0
Vendor: Pulse Secure Vendor URL: https://www.pulsesecure.net/ Versions affected: Pulse Connect Secure (PCS) 9.1Rx or below Systems Affected: Pulse Connect Secure (PCS) Appliances CVE Identifier: CVE-2020-8255 Advisory URL: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 Risk: 4.9...

NotrinosERP 0.7 SQL Injection

0
Authored by Arvandy NotrinosERP version 0.7 suffers from a remote authentication blind SQL injection vulnerability. advisories | CVE-2023-24788 Change Mirror Download # Exploit Title: NotrinosERP 0.7 - Authenticated...

EP 148: Dubsnatch

0
Full Transcript Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks?...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

C-MOR Video Surveillance 5.2401 Cross Site Scripting

0
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de C-MOR Video Surveillance version 5.2401 suffers from a reflective cross site scripting vulnerability. advisories |...

C-MOR Video Surveillance 5.2401 / 6.00PL01 Cross Site Scripting

0
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a persistent cross site scripting...

C-MOR Video Surveillance 5.2401 / 6.00PL01 Cross Site Request Forgery

0
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a cross site request forgery...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json