Popular Podcasts

Carnival Cruise Line Reports Security Breach

0
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2021-21257PUBLISHED: 2021-06-18 Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in...

Cyber Vulnerabilities & Exploits

The latest hacker news

MrbMiner Crypto-Mining Malware Links to Iranian Software Company

0
By: Ravie Lakshmanan A relatively new crypto-mining malware that surfaced last year and infected thousands of Microsoft SQL Server (MSSQL) databases has now been linked...

Tesla Ransomware Hacker Pleads Guilty; Swiss Hacktivist Charged for Fraud

0
By: Ravie Lakshmanan The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned...

German Police Seize ‘Nemesis Market’ in Major International Darknet Raid

0
Mar 24, 2024NewsroomRansomware / Threat Intelligence German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data,...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Generative AI Security: Preventing Microsoft Copilot Data Exposure

0
By: Microsoft Copilot has been called one of the most powerful productivity tools on the planet. Copilot is an AI assistant that lives inside each...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

EU antitrust regulators to investigate Google’s adtech business

0
Alphabet unit Google on Tuesday found itself in the EU antitrust spotlight again as regulators opened an investigation into its lucrative digital advertising business...

Backdoor.Win32.Wollf.h Remote Command Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Wollf.h malware suffers from a remote command execution vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2022Original source:...

Technical Advisory – Multiple Vulnerabilities in Trendnet TEW-831DR WiFi Router (CVE-2022-30325, CVE-2022-30326, CVE-2022-30327, CVE-2022-30328,...

0
The Trendnet TEW-831DR WiFi Router was found to have multiple vulnerabilities exposing the owners of the router to potential intrusion of their local WiFi...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Gambio Online Webshop 4.9.2.0 Remote Code Execution

0
Authored by h00die-gr3y, usd Herolab | Site metasploit.com A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json