Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

State-Backed Hackers Targeting Journalists in Widespread Espionage Campaigns

0
By: Ravie Lakshmanan Nation-state hacking groups aligned with China, Iran, North Korea, and Turkey have been targeting journalists to conduct espionage and spread malware as...

IT Giant Accenture Hit by LockBit Ransomware; Hackers Threaten to Leak Data

0
By: Ravie Lakshmanan Global IT consultancy giant Accenture has become the latest company to be hit by the LockBit ransomware gang, according to a post...

CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability

0
By: î ‚Feb 28, 2023î „Ravie LakshmananSoftware Security / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

How to Identify a Cyber Adversary: Standards of Proof

0
COMMENTARYPart one of a two-part article.In cybersecurity, attribution refers to identifying an adversary (not just the persona) likely responsible for malicious activity. It is...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$63,889.00
Ethereum(ETH)
$3,061.99
XRP(XRP)
$0.52
Bitcoin Cash(BCH)
$488.05
Litecoin(LTC)
$82.72
Stellar(XLM)
$0.113594
Monero(XMR)
$117.60
Tezos(XTZ)
$1.02
EOS(EOS)
$0.80

Croogo 3.0.2 Cross Site Scripting

0
Authored by Enes Ozeser Croogo version 3.0.2 suffers from cross site scripting vulnerabilities. Change Mirror Download # Exploit Title: Croogo 3.0.2 - 'Multiple' Stored Cross-Site Scripting (XSS)#...

Apple to bring social media platform Parler back to App Store

0
Apple Inc will bring social media app Parler, favored by U.S conservatives, back to its App Store after the iPhone maker pulled it following...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an authentication bypass vulnerability through a direct and...

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Insecure Direct Object Reference

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an unauthenticated device configuration and client-side hidden functionality...

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an authentication bypass vulnerability through a direct and unauthorized access...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json