Popular Podcasts

Glibc Tunables Privilege Escalation

0
Authored by Blasty, jheysel-r7, Qualys Threat Research Unit | Site metasploit.com A buffer overflow exists in the GNU C Library's dynamic loader ld.so while processing...

Cyber Vulnerabilities & Exploits

The latest hacker news

Chinese APT Hackers Target Southeast Asian Government Institutions

0
By: Ravie Lakshmanan Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe...

Zero-Day Alert: Update Chrome Now to Fix New Actively Exploited Vulnerability

0
By: î ‚Jan 17, 2024î „NewsroomBrowser Security / Vulnerability Google on Tuesday released updates to fix four security issues in its Chrome browser, including an actively exploited...

Indian Government Publishes Draft of Digital Personal Data Protection Bill 2022

0
By: Ravie Lakshmanan The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it the fourth such effort since...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

LastPass Parent Company GoTo Suffers Data Breach, Customers’ Backups Compromised

0
By: î ‚Jan 25, 2023î „Ravie LakshmananData Breach / Remote Work Tool LastPass-owner GoTo (formerly LogMeIn) on Tuesday disclosed that unidentified threat actors were able to steal...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
14SubscribersSubscribe

Cryptocurrency Prices

Please enter CoinGecko Free Api Key to get this plugin works.

Energy giant Shell impacted in Accellion hack

0
Written by Shannon...

LockBit 2.0 Ransomware Proliferates Globally

0
Fresh attacks target companies’ employees, promising millions of dollars in exchange for valid account credentials for initial access. The LockBit ransomware-as-a-service (RaaS) gang has ramped...

Biden order will limit how much data can be sold to Russia and China

0
Data brokers and other companies peddling Americans’ personal information to hostile countries such as Russia and China are now in the crosshairs of the...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Acronis Cyber Protect/Backup Remote Code Execution

0
Authored by h00die-gr3y | Site metasploit.com The Acronis Cyber Protect appliance, in its default configuration, allows the anonymous registration of new protect/backup agents on new...

Siemens Unlocked JTAG Interface / Buffer Overflow

0
Authored by Stefan Viehboeck, Constantin Schieber-Knöbl | Site sec-consult.com Various Siemens products suffer from vulnerabilities. There is an unlocked JTAG Interface for Zynq-7000 on SM-2558...

Omada Identity Cross Site Scripting

0
Authored by Daniel Hirschberger | Site sec-consult.com Omada Identity versions prior to 15U1 and 14.14 hotfix #309 suffer from a persistent cross site scripting vulnerability. advisories...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.