Popular Podcasts

Ransomware Defense: Top 5 Things to Do Right Now

0
Matt Bromiley, senior consultant with Mandiant Managed Defense, discusses the top tricks and tips for protecting enterprise environments from ransomware. If there is any cyber-threat...

Cyber Vulnerabilities & Exploits

The latest hacker news

FBI, DHS Warn Of Possible Major Ransomware Attacks On Healthcare Systems

0
By: Ravie Lakshmanan The US Federal Bureau of Investigation (FBI), Departments of Homeland Security, and Health and Human Services (HHS) issued a joint alert Wednesday...

FIN8 Hackers Return With More Powerful Version of BADHATCH PoS Malware

0
By: Ravie Lakshmanan Threat actors known for keeping a low profile do so by ceasing operations for prolonged periods in between to evade attracting any...

A New Wiper Malware Was Behind Recent Cyberattack On Iranian Train System

0
By: Ravie Lakshmanan A cyber attack that derailed websites of Iran's transport ministry and its national railway system earlier this month, causing widespread disruptions in...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Rogue WordPress Plugin Exposes E-Commerce Sites to Credit Card Theft

0
By: î ‚Dec 22, 2023î „NewsroomSkimming / Web Security Threat hunters have discovered a rogue WordPress plugin that's capable of creating bogus administrator users and injecting malicious...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$70,586.00
Ethereum(ETH)
$3,577.89
XRP(XRP)
$0.62
Bitcoin Cash(BCH)
$559.33
Litecoin(LTC)
$95.89
Stellar(XLM)
$0.136684
Monero(XMR)
$138.09
Tezos(XTZ)
$1.40
EOS(EOS)
$1.07

FIN7 Hackers Using Windows 11 Themed Documents to Drop Javascript Backdoor

0
By: Ravie Lakshmanan A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including...
dark reading threat intel and cybersecurity news

‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein

0
We imagine that the world’s most successful hackers write their own dangerous code and invest heavily in the technologies they use to breach their...

Auerswald COMpact 8.0B Backdoors

0
Site redteam-pentesting.de RedTeam Pentesting discovered several backdoors in the firmware for the Auerswald COMpact 5500R PBX. These backdoors allow attackers who are able to access...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Sharepoint Dynamic Proxy Generator Remote Command Execution

0
Authored by Jang, jheysel-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Sharepoint 2019 - an authentication bypass as noted in CVE-2023-29357 which...

Task Management System 1.0 SQL Injection

0
Authored by Gnanaraj Mauviel Task Management System version 1.0 suffers from multiple remote SQL injection vulnerabilities. advisories | CVE-2024-29301, CVE-2024-29302, CVE-2024-29303 Change Mirror Download # Exploit Title: SourceCodester...

Win32.STOP.Ransomware (Smokeloader) MVID-2024-0676 Remote Code Execution

0
Authored by malvuln | Site malvuln.com Win32.STOP.Ransomware (smokeloader) malware suffers from both local and remote code execution vulnerabilities. The remote code execution can be achieved...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json