Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In

0
By: Ravie Lakshmanan India's computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities...

Netwalker Ransomware Proves Attackers Dont Need Cutting Edge Malware

0
Malware and related records show that ransomware administrators needn't bother with a bleeding edge weapons store to be viable. A malware apparatus set and related...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’...

0
By: Ravie Lakshmanan Online trading and discount brokerage platform Upstox has become the latest Indian company to suffer a security breach of its systems, resulting...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$70,915.00
Ethereum(ETH)
$3,580.55
XRP(XRP)
$0.62
Bitcoin Cash(BCH)
$573.74
Litecoin(LTC)
$94.85
Stellar(XLM)
$0.137529
Monero(XMR)
$136.13
Tezos(XTZ)
$1.39
EOS(EOS)
$1.06

Amid widespread unrest, Sudan shutters its Internet. A new PRC influence campaign targets US...

0
Amid widespread unrest, Sudan shutters its Internet. A new PRC influence campaign targets US elections. Software supply chain security. And cybercrime in wartime. Sudan closes...

RCE Vulnerability Detected In Firefox SharedWorker Component

0
The vulnerability affects Firefox version 76.0a1 x64 and is contained in the SharedWorker component. Specialists from the Cisco Talos team reported a critical vulnerability (CVE-2020-12405) in the...

Backdoor.Win32.Destrukor.20 MVID-2022-0626 Authentication Bypass / Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Destrukor.20 malware suffers from authentication bypass and code execution vulnerabilities. Change Mirror Download Discovery / credits: Malvuln (John Page aka hyp3rlinx)...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Sharepoint Dynamic Proxy Generator Remote Command Execution

0
Authored by Jang, jheysel-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Sharepoint 2019 - an authentication bypass as noted in CVE-2023-29357 which...

Task Management System 1.0 SQL Injection

0
Authored by Gnanaraj Mauviel Task Management System version 1.0 suffers from multiple remote SQL injection vulnerabilities. advisories | CVE-2024-29301, CVE-2024-29302, CVE-2024-29303 Change Mirror Download # Exploit Title: SourceCodester...

Win32.STOP.Ransomware (Smokeloader) MVID-2024-0676 Remote Code Execution

0
Authored by malvuln | Site malvuln.com Win32.STOP.Ransomware (smokeloader) malware suffers from both local and remote code execution vulnerabilities. The remote code execution can be achieved...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json