Popular Podcasts

Europol Busts Phishing Gang Responsible for Millions in Losses

0
By: Ravie Lakshmanan Europol on Tuesday announced the dismantling of an organized crime group that dabbled in phishing, fraud, scams, and money laundering activities. The cross-border...

Cyber Vulnerabilities & Exploits

The latest hacker news

FBI Cracks Down on Genesis Market: 119 Arrested in Cybercrime Operation

0
By: A joint international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated...

Beware: Tainted VPNs Being Used to Spread EyeSpy Surveillanceware

0
By: î ‚Jan 13, 2023î „Ravie LakshmananVPN / Surveillanceware Tainted VPN installers are being used to deliver a piece of surveillanceware dubbed EyeSpy as part of a...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

0
By: î ‚Dec 23, 2022î „Ravie LakshmananPassword Management / Data Breach The August 2022 security breach of LastPass may have been more severe than previously disclosed by...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Dark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson

0
Tim Wilson, Dark Reading's co-founder and editor-in-chief, passed away on Nov. 23, 2021, after a courageous battle with cancer. His death is a tremendous...

WordPress Gutenberg 18.0.0 Cross Site Scripting

0
Authored by tmrswrr WordPress Gutenberg plugin version 18.0.0 suffers from a persistent cross site scripting vulnerability. Change Mirror Download ## Exploit Title: Wordpress Gutenberg Plugin Version 18.0.0...

Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack

0
By: î ‚Oct 05, 2023î „NewsroomCyber Espionage / Cyber Threat A governmental entity in Guyana has been targeted as part of a cyber espionage campaign dubbed Operation...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

ESET NOD32 Antivirus 17.1.11.0 Unquoted Service Path

0
Authored by Milad Karimi ESET NOD32 Antivirus version 17.1.11.0 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: ESET NOD32 Antivirus 17.1.11.0 -...

Doctor Appointment Management System 1.0 Cross Site Scripting

0
Authored by SoSPiro Doctor Appointment Management System version 1.0 suffers from a cross site scripting vulnerability. advisories | CVE-2024-4293 Change Mirror Download # Application Name: Doctor Appointment Management...

Kemp LoadMaster Unauthenticated Command Injection

0
Authored by Dave Yesland | Site metasploit.com This Metasploit module exploits an unauthenticated command injection vulnerability in Progress Kemp LoadMaster in the authorization header after...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json