Popular Podcasts

Online Railway Reservation System 1.0 Cross Site Scripting

0
Authored by Zachary Asher Online Railway Reservation System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities. Change Mirror Download #Exploit Title: Online Railway Reservation System...

Cyber Vulnerabilities & Exploits

The latest hacker news

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

0
By: The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement...

Clop Ransomware Gang Likely Aware of MOVEit Transfer Vulnerability Since 2021

0
By: î ‚Jun 08, 2023î „Ravie LakshmananRansomware / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

0
By: Ravie Lakshmanan The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Lapsus$ has exaggerated the scale of the access to Okta

0
Authentication firm Okta has reached out to all 366 customers potentially affected by the recent breach. Lapsus$ extortion group had access to the support...

Student Study Center Management System 1.0 Cross Site Scripting

0
Authored by Vivek Choudhary Student Study Center Management System version 1.0 suffers from a persistent cross site scripting vulnerability. advisories | CVE-2023-33580 Change Mirror Download # Exploit Title:...

Pi-Hole Remove Commands Linux Privilege Escalation

0
Authored by h00die, Emanuele Barbeno | Site metasploit.com Pi-Hole versions 3.0 through 5.3 allows for command line input to the removecustomcname, removecustomdns, and removestaticdhcp functions...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Backdrop CMS 1.27.1 Remote Command Execution

0
Authored by Ahmet Umit Bayram Backdrop CMS version 1.27.1 suffers from a remote command execution vulnerability. Change Mirror Download # Exploit Title: Backdrop CMS 1.27.1 - Remote...

Apache OFBiz 18.12.12 Directory Traversal

0
Authored by Abdualhadi Khalifa Apache OFBiz versions 18.12.12 and below suffer from a directory traversal vulnerability. Change Mirror Download # Exploit Title: Apache OFBiz 18.12.12 - Directory...

WordPress XStore Theme 9.3.8 SQL Injection

0
Authored by Abdualhadi Khalifa WordPress XStore theme version 9.3.8 suffers from a remote SQL injection vulnerability. advisories | CVE-2024-33559 Change Mirror Download # Exploit Title: Wordpress Theme XStore...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json