Popular Podcasts

Alpha-Omega Project takes a human-centered approach to open-source software security

0
The Log4j vulnerability crisis that erupted in late-2021 heightened the security world’s awareness of supply chain risks in free and universally deployed open-source software....

Cyber Vulnerabilities & Exploits

The latest hacker news

Gold Ulrick Hackers Still in Action Despite Massive Conti Ransomware Leak

0
By: Ravie Lakshmanan The infamous ransomware group known as Conti has continued its onslaught against entities despite suffering a massive data leak of its own...

New SideWalk Backdoor Targets U.S.-based Computer Retail Business

0
By: Ravie Lakshmanan A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a...

Federal agency has suffered a successful espionage-related cyberattack

0
By: Tara Seals The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit. A federal agency has suffered a successful espionage-related cyberattack that...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Cyberattackers Lure EU Diplomats With Wine-Tasting Offers

0
Europeans are known to enjoy fine wine, a cultural characteristic that's been used against them by attackers behind a recent threat campaign. The cyber...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

b2evolution CMS 6.11.6 Cross Site Scripting

0
Authored by Nakul Ratti, Soham Bakore b2evolution CMS version 6.11.6 suffers from multiple cross site scripting vulnerabilities. advisories | CVE-2020-22839, CVE-2020-22841 Change Mirror Download # Exploit Title: *Reflected...

Qualcomm Adreno/KGSL Data Leakage

0
Authored by Jann Horn, Google Security Research On Qualcomm Adreno/KGSL builds where CONFIG_QCOM_KGSL_USE_SHMEM is not set (or on older KGSL versions without CONFIG_QCOM_KGSL_USE_SHMEM), KGSL allocates...
dark reading threat intel and cybersecurity news

Improving the Vulnerability Reporting Process With 5 Steps

0
Follow these tips for an effective and positive experience for both the maintainer and external vulnerability reporter.Vulnerability reports come at open source project maintainers...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Doctor Appointment Management System 1.0 Cross Site Scripting

0
Authored by SoSPiro Doctor Appointment Management System version 1.0 suffers from a cross site scripting vulnerability. advisories | CVE-2024-4293 Change Mirror Download # Application Name: Doctor Appointment Management...

Kemp LoadMaster Unauthenticated Command Injection

0
Authored by Dave Yesland | Site metasploit.com This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Kemp LoadMaster in the authorization header after...

osCommerce 4 Cross Site Scripting

0
Authored by CraCkEr osCommerce version 4 suffers from a cross site scripting vulnerability. This finding is another vector of attack for this issue already discovered...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json