Popular Podcasts

European banking regulator EBA targeted in Microsoft hacking

0
The European Banking Authority on Monday said it had been targeted by hackers, although no data had been obtained and it was redoubling efforts...

Cyber Vulnerabilities & Exploits

The latest hacker news

533 Million Facebook Users’ Phone Numbers and Personal Data Leaked Online

0
By: Ravie Lakshmanan In what's likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been...

North Korean Hackers Targeting Europe and Latin America with Updated DTrack Backdoor

0
By: Ravie Lakshmanan Hackers tied to the North Korean government have been observed using an updated version of a backdoor known as Dtrack targeting a...

Babuk ransomware builder leaked following muddled “retirement”

0
Heads are being scratched after the Babuk ransomware builder appears on VirtuTotal, adding to the gang's reputation for confusion. In the last days...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Linux Variants of Bifrost Trojan Evade Detection via Typosquatting

0
A 20-year-old Trojan resurfaced recently with new variants that target Linux and impersonate a trusted hosted domain to evade detection.Researchers from Palo Alto Networks...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Vaskar Courier 3.2.0 Insecure Settings

0
Authored by indoushka Vaskar Courier version 3.2.0 appears to leave default credentials installed after installation. Change Mirror Download ================================================================================| # Title : Vaskar...
dark reading threat intel and cybersecurity news

Name That Toon: Knives Out

0
What's a cartoon without a clever caption? For that we turn to you, our witty readers. Send us your ideas not only for the chance to win a...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Chyrp 2.5.2 Cross Site Scripting

0
Authored by Ahmet Umit Bayram Chryp version 2.5.2 suffers from a persistent cross site scripting vulnerability. Change Mirror Download # Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)#...

Apache mod_proxy_cluster Cross Site Scripting

0
Authored by Mohamed Mounir Boudjema Apache mod_proxy_cluster suffers from a cross site scripting vulnerability. advisories | CVE-2023-6710 Change Mirror Download import requestsimport argparsefrom bs4 import BeautifulSoupfrom urllib.parse import...

Backdoor.Win32.AsyncRat MVID-2024-0683 Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.AsyncRat malware suffers from a code execution vulnerability. Change Mirror Download Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json