Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

Ukrainian Radio Stations Hacked to Broadcast Fake News About Zelenskyy’s Health

0
By: Ravie Lakshmanan Ukrainian radio operator TAVR Media on Thursday became the latest victim of a cyberattack, resulting in the broadcast of a fake message...

New Ramsay Malware That Can Breach Air Gapped Networks

0
Researchers from cyber-security firm ESET announced today that they discovered a never-before-seen malware framework with advanced capabilities that are rarely seen today. Named Ramsay, ESET...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and...

0
By: Ravie Lakshmanan Telecom company T-Mobile on Friday confirmed that it was the victim of a security breach in March after the LAPSUS$ mercenary gang...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Aerohive NetConfig 10.0r8a Local File Inclusion / Remote Code Execution

0
Authored by Erik Wynter, Erik de Jong | Site metasploit.com This Metasploit module exploits local file inclusion and log poisoning vulnerabilities (CVE-2020-16152) in Aerohive NetConfig,...

Chrome HandleTable::AddDispatchersFromTransit Integer Overflow

0
Authored by Google Security Research, Glazvunov Chrome suffers from an integer overflow vulnerability in HandleTable::AddDispatchersFromTransit that can lead to memory corruption. advisories | CVE-2022-0608

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Microsoft PlayReady Toolkit

0
Authored by Adam Gowdiak | Site security-explorations.com The Microsoft PlayReady toolkit assists with fake client device identity generation, acquisition of license and content keys for...

Systemd Insecure PTY Handling

0
Authored by Adam Gowdiak | Site security-explorations.com Systemd-run/run0 allocates user-owned ptys and attaches the slave to high privilege programs without changing ownership or locking the...

Windows PspBuildCreateProcessContext Double-Fetch / Buffer Overflow

0
Authored by gabe_k Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in PspBuildCreateProcessContext...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json