Monday, June 16, 2025

Popular Podcasts

How to Buy Precious Patching Time as Log4j Exploits Fly

0
Podcast: Cybereason shares details about its vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show being...

Cyber Vulnerabilities & Exploits

The latest hacker news

APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries

0
By: Introduction In today's interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in enabling seamless communication and data exchange between various software...

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

0
Romanian cybersecurity company Bitdefender has released a free decryptor to help victims recover data encrypted using the ShrinkLocker ransomware. The decryptor is the result of...

Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives

0
By: î ‚Jan 30, 2024î „NewsroomCyber Crime / Malware A Brazilian law enforcement operation has led to the arrest of several Brazilian operators in charge of the...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

Former Amazon Employee Found Guilty in 2019 Capital One Data Breach

0
By: Ravie Lakshmanan A 36-year-old former Amazon employee was convicted of wire fraud and computer intrusions in the U.S. for her role in the theft...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
14SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.
dark reading threat intel and cybersecurity news

Iran-Backed Charming Kitten APT Eyes Kinetic Ops, Kidnapping

0
State-sponsored advanced persistent threat (APT) Charming Kitten (aka TA453), which is purportedly linked to the Islamic Revolutionary Guard Corps (IRGC), has updated its phishing techniques, and is...

Forcepoint (Stonesoft VPN Client) 6.2.0 / 6.8.0 Local Privilege Escalation

0
Authored by Touhami Kasbaoui Forcepoint (Stonesoft VPN Client) versions 6.2.0 and 6.8.0 suffer from a privilege escalation vulnerability. Change Mirror Download # Exploit Author : TOUHAMI KASBAOUI#...

Another Google Chrome 0-Day Bug Found Actively Exploited In-the-Wild

0
By: Ravie Lakshmanan Google has addressed yet another actively exploited zero-day in Chrome browser, marking the second such fix released by the company within a...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Acronis Cyber Protect/Backup Remote Code Execution

0
Authored by h00die-gr3y | Site metasploit.com The Acronis Cyber Protect appliance, in its default configuration, allows the anonymous registration of new protect/backup agents on new...

Siemens Unlocked JTAG Interface / Buffer Overflow

0
Authored by Stefan Viehboeck, Constantin Schieber-Knöbl | Site sec-consult.com Various Siemens products suffer from vulnerabilities. There is an unlocked JTAG Interface for Zynq-7000 on SM-2558...

Omada Identity Cross Site Scripting

0
Authored by Daniel Hirschberger | Site sec-consult.com Omada Identity versions prior to 15U1 and 14.14 hotfix #309 suffer from a persistent cross site scripting vulnerability. advisories...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.