Popular Podcasts

HealthForYou 1.11.1 / HealthCoach 2.9.2 User Enumeration

0
Authored by Nick Decker | Site trovent.io HealthForYou version 1.11.1 and HealthCoach version 2.9.2 suffer from a user enumeration vulnerability. Change Mirror Download # Trovent Security Advisory...

Cyber Vulnerabilities & Exploits

The latest hacker news

Medibank Refuses to Pay Ransom After 9.7 Million Customers Exposed in Ransomware Hack

0
By: Ravie Lakshmanan Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of its current and former customers were accessed...

US Sanctions Russia and Expels 10 Diplomats Over SolarWinds Cyberattack

0
By: Ravie Lakshmanan The U.S. and U.K. on Thursday formally attributed the supply chain attack of IT infrastructure management company SolarWinds with "high confidence" to...

Telcom and BPO Companies Under Attack by SIM Swapping Hackers

0
By: Dec 06, 2022Ravie LakshmananSIM Swapping / Network Intrusion A persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Key Cybersecurity Tools That Can Mitigate the Cost of a Breach

0
By: Sep 05, 2023The Hacker NewsData Breach / Password Security IBM's 2023 installment of their annual "Cost of a Breach" report has thrown up some...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Podcast: IoT Piranhas Are Swarming Industrial Controls

0
Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure. Full transparency: Curtis Simpson,...

Cybercrime (and Security) Predictions for 2023

0
By: Dec 19, 2022The Hacker NewsPassword Policy / Data Security Threat actors continue to adapt to the latest technologies, practices, and even data privacy laws—and...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Gambio Online Webshop 4.9.2.0 Remote Code Execution

0
Authored by h00die-gr3y, usd Herolab | Site metasploit.com A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json