Popular Podcasts

Macro Expert 4.9 Unquoted Service Path

0
Authored by Murat Demirci Macro Expert version 4.9 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: Macro Expert 4.9 - Unquoted Service...

Cyber Vulnerabilities & Exploits

The latest hacker news

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection

0
By: Ravie Lakshmanan Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every...

Researchers Detail Severe “Super FabriXss” Vulnerability in Microsoft Azure SFX

0
By: î ‚Mar 30, 2023î „Ravie LakshmananCloud Security / Vulnerability Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to...

Ransomware Tactics, Techniques And How it Has Evolved

0
Ransomware Landscape Has Adapted and Evolved Author: Kyle Fedorek Ransomware attacks have increased manifold over the years and so have the ransom demands. This year-over-year evolution...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Reddit Suffers Security Breach Exposing Internal Documents and Source Code

0
By: î ‚Feb 10, 2023î „Ravie LakshmananData Breach / Source Code Popular social news aggregation platform Reddit has disclosed that it was the victim of a security...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Metaparasites & the Dark Web: Scammers Turn on Their Own

0
Cybercriminals are often seen as parasites, feeding off a wide swath of victims of every size and stripe. But as it turns out, they've...

FBI warns of potential cyberattacks during Beijing Winter Olympics

0
Malicious threat actors might use cyber tools to disrupt the February Beijing Winter Olympics and March Paralympics. Significant, high-profile events provide an opportunity for threat...

German Man Accused of Running a Darkweb Child Abuse Forum

0
HomePostsGerman Man Accused of Running a Darkweb Child Abuse ForumGerman Man Accused of Running a Darkweb Child Abuse ForumThe Dresden Public Prosecutor’s Office accused...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

osCommerce 4 Cross Site Scripting

0
Authored by CraCkEr osCommerce version 4 suffers from a cross site scripting vulnerability. This finding is another vector of attack for this issue already discovered...

undefinedExploiting The NT Kernel In 24H2undefined

0
Authored by gabe_k This is the full Windows privilege escalation exploit produced from the blog Exploiting the NT Kernel in 24H2: New Bugs in Old...

Windows NtQueryInformationThread Double-Fetch / Arbitrary Write

0
Authored by gabe_k Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in NtQueryInformationThread...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json