Popular Podcasts

TrickBot Takedown Disrupts Major Crimeware Apparatus

0
Microsoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers. The TrickBot trojan has been dealt a serious...

Cyber Vulnerabilities & Exploits

The latest hacker news

dark reading threat intel and cybersecurity news

LogoKit Group Aims for Simple Yet Effective Phishing

0
A phishing kit that uses embedded JavaScript targeted the users of more than 300 sites in the past week, aiming to grab credentials for...

19-Year-Old Teen Arrested for Using Leaked Optus Breach Data in SMS Scam

0
By: Ravie Lakshmanan The Australian Federal Police (AFP) has arrested a 19-year-old teen from Sydney for allegedly attempting to leverage the data leaked following the...

Revolut Faces $20 Million Loss as Attackers Exploit Payment System Weakness

0
By: Malicious actors exploited an unknown flaw in Revolut's payment systems to steal more than $20 million of the company's funds in early 2022. The...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Microsoft and Okta Confirm Breach by LAPSUS$ Extortion Group

0
By: Ravie Lakshmanan Microsoft on Tuesday confirmed that the LAPSUS$ extortion-focused hacking crew had gained "limited access" to its systems, as authentication services provider Okta...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$66,731.00
Ethereum(ETH)
$3,257.93
XRP(XRP)
$0.55
Bitcoin Cash(BCH)
$506.21
Litecoin(LTC)
$86.61
Stellar(XLM)
$0.120227
Monero(XMR)
$121.64
Tezos(XTZ)
$1.09
EOS(EOS)
$0.86

Malware Loader Abuses Google SEO to Expand Payload Delivery

0
Gootloader has expanded its payloads beyond the Gootkit malware family, using Google SEO poisoning to gain traction. The Gootloader malware loader, previously used for distributing...

The Business of Hackers-for-Hire Threat Actors

0
By: The Hacker News Today's web has made hackers' tasks remarkably easy. For the most part, hackers don't even have to hide in the dark...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Laravel Framework 11 Credential Disclosure

0
Authored by Huseein Amer Laravel Framework version 11 suffers from a credential disclosure vulnerability. advisories | CVE-2024-29291 Change Mirror Download # Exploit Title: Laravel Framework 11 - Credential...

SofaWiki 3.9.2 Shell Upload

0
Authored by Ahmet Umit Bayram SofaWiki version 3.9.2 suffers from a remote shell upload vulnerability. Change Mirror Download # Exploit Title: SofaWiki 3.9.2 - Remote Command Execution...

Dreamehome 2.1.5 Broken Authorization

0
Authored by Alissa Kim | Site sec-consult.com Dreamehome versions 2.1.5 and below suffer from multiple broken authorization vulnerabilities. Change Mirror Download SEC Consult Vulnerability Lab Security Advisory...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json