Popular Podcasts

Cyber Vulnerabilities & Exploits

The latest hacker news

CISA Sets a Deadline – Patch Juniper Junos OS Flaws Before November 17

0
By: î ‚Nov 14, 2023î „NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given a November 17, 2023, deadline for federal agencies...

Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies

0
By: Ravie Lakshmanan Microsoft on Thursday said it took steps to disable malicious activity stemming from abuse of OneDrive by a previously undocumented threat actor...

TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users’ Information

0
By: Ravie Lakshmanan Popular short-form social video service TikTok denied reports that it was breached by a hacking group, after it claimed to have gained...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies’ Data Leak

0
By: Ravie Lakshmanan Microsoft this week confirmed that it inadvertently exposed information related to thousands of customers following a security lapse that left an endpoint...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

modoboa 2.0.4 Admin Takeover

0
Authored by 7h3h4ckv157 modoboa version 2.0.4 suffers from an administrative takeover vulnerability. advisories | CVE-2023-0777 Change Mirror Download /* # Exploit Title: modoboa 2.0.4 - Admin TakeOver...

Between Two Nerds: Busting 0day Myths

0
In this edition of Between Two Nerds Tom Uren and The Grugq look at the life...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Chyrp 2.5.2 Cross Site Scripting

0
Authored by Ahmet Umit Bayram Chryp version 2.5.2 suffers from a persistent cross site scripting vulnerability. Change Mirror Download # Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)#...

Apache mod_proxy_cluster Cross Site Scripting

0
Authored by Mohamed Mounir Boudjema Apache mod_proxy_cluster suffers from a cross site scripting vulnerability. advisories | CVE-2023-6710 Change Mirror Download import requestsimport argparsefrom bs4 import BeautifulSoupfrom urllib.parse import...

Backdoor.Win32.AsyncRat MVID-2024-0683 Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.AsyncRat malware suffers from a code execution vulnerability. Change Mirror Download Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json