Popular Podcasts

Microsoft links new malware to SolarWinds hackers

0
By: Joe Uchill Microsoft released details Thursday on later-stage malware the company says...

Cyber Vulnerabilities & Exploits

The latest hacker news

Algolia Search Service Hacked Using Salt Vulnerability

0
 May 8, 2020 The search service Algolia reported a hack during which attackers exploited a vulnerability in the software for setting up Salt servers and gained access...

Malware Attack on CircleCI Engineer’s Laptop Leads to Recent Security Incident

0
By: î ‚Jan 14, 2023î „Ravie LakshmananDevOps / Data Security DevOps platform CircleCI on Friday disclosed that unidentified threat actors compromised an employee's laptop and leveraged malware...

Fodcha DDoS Botnet Resurfaces with New Capabilities

0
By: Ravie Lakshmanan The threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes to its communication...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Cybersecurity Firm FireEye Got Hacked; Red-Team Pentest Tools Stolen

0
By: Ravie Lakshmanan FireEye, one of the largest cybersecurity firms in the world, said on Tuesday it became a victim of a state-sponsored attack by...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Zero-Day Exploit Use Exploded in 2021

0
Threat actors exploited more zero-day vulnerabilities in 2021 than any prior year and mostly in software from Microsoft, Google, and Apple. State-backed advanced persistent threat...

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked...

0
Days after a massive Facebook data leak made the headlines, it seems like we’re in for another one, this time involving LinkedIn.An archive containing...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

ESET NOD32 Antivirus 17.1.11.0 Unquoted Service Path

0
Authored by Milad Karimi ESET NOD32 Antivirus version 17.1.11.0 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: ESET NOD32 Antivirus 17.1.11.0 -...

Doctor Appointment Management System 1.0 Cross Site Scripting

0
Authored by SoSPiro Doctor Appointment Management System version 1.0 suffers from a cross site scripting vulnerability. advisories | CVE-2024-4293 Change Mirror Download # Application Name: Doctor Appointment Management...

Kemp LoadMaster Unauthenticated Command Injection

0
Authored by Dave Yesland | Site metasploit.com This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Kemp LoadMaster in the authorization header after...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json