Popular Podcasts

Wondershare Dr.Fone 12.0.18 Unquoted Service Path

0
Authored by Mohamed Alzhrani Wondershare Dr.Fone version 12.0.18 suffers from an unquoted service path vulnerability. Change Mirror Download # Exploit Title: Wondershare Dr.Fone 12.0.18 - 'Wondershare InstallAssist'...

Cyber Vulnerabilities & Exploits

The latest hacker news

A Trip to the Dark Site — Leak Sites Analyzed

0
By: The Hacker News Gone are the days when ransomware operators were happy with encrypting files on-site and more or less discretely charged their victims...

Ransomware Group FIN12 Aggressively Going After Healthcare Targets

0
By: Ravie Lakshmanan An "aggressive" financially motivated threat actor has been identified as linked to a string of RYUK ransomware attacks since October 2018, while...

18-Year-Old Hacker Gets 3 Years in Prison for Massive Twitter ‘Bitcoin Scam’ Hack

0
By: Ravie Lakshmanan A Florida teen accused of masterminding the hacks of several high-profile Twitter accounts last summer as part of a widespread cryptocurrency scam...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults

0
By: î ‚Feb 28, 2023î „Ravie LakshmananPassword Security / Data Breach LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Technical Advisory – Multiple Vulnerabilities in U-Boot (CVE-2022-30790, CVE-2022-30552)

0
By Nicolas Bidron, and Nicolas Guigo. U-boot is a popular boot loader for embedded systems with implementations for a large number of architectures and prominent...

HiSecOS 04.0.01 Privilege Escalation

0
Authored by dreizehnutters HiSecOS versions 04.0.01 and below suffer from a privilege escalation vulnerability. Change Mirror Download # Exploit Title: HiSecOS 04.0.01 - Privilege Escalation# Google Dork:...

Linux Kernel 5.4 BleedingTooth Remote Code Execution

0
Authored by Andy Nguyen Linux kernel version 5.4 BleedingTooth bluetooth zero-click proof of concept remote code execution exploit. advisories | CVE-2020-12351, CVE-2020-12352 Change Mirror Download /* * BleedingTooth:...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Gambio Online Webshop 4.9.2.0 Remote Code Execution

0
Authored by h00die-gr3y, usd Herolab | Site metasploit.com A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json