Popular Podcasts

Joomla JKassa ShoppingCart 2.0.0 SQL Injection

0
Authored by CraCkEr Joomla JKassa ShoppingCart extension version 2.0.0 suffers from a remote SQL injection vulnerability. Change Mirror Download ┌┌───────────────────────────────────────────────────────────────────────────────────────┐││ ...

Cyber Vulnerabilities & Exploits

The latest hacker news

Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor

0
By: Ravie Lakshmanan As the investigation into the SolarWinds supply-chain attack continues, cybersecurity researchers have disclosed a third malware strain that was deployed into the...

Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia

0
By: Feb 22, 2023Ravie LakshmananCyber Espionage / Cyber Attack Shipping companies and medical laboratories in Asia have been the subject of a suspected espionage campaign...

APT Gamaredon Using New Hacking Tools For Microsoft Outlook, Excel & Office

0
Gamaredon Hackers Using New Tools for Microsoft Outlook, Office, and Excel A Russia-linked APT group named Gamaredon (aka Primitive Bear) has been using several undocumented...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

How to Identify a Cyber Adversary: Standards of Proof

0
COMMENTARYPart one of a two-part article.In cybersecurity, attribution refers to identifying an adversary (not just the persona) likely responsible for malicious activity. It is...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$64,290.00
Ethereum(ETH)
$3,085.91
XRP(XRP)
$0.51
Bitcoin Cash(BCH)
$481.49
Litecoin(LTC)
$81.50
Stellar(XLM)
$0.112167
Monero(XMR)
$117.98
Tezos(XTZ)
$0.99
EOS(EOS)
$0.78

Atlassian Confluence SSTI Injection

0
Authored by Spencer McIntyre, Harsh Jaiswal, Rahul Maini | Site metasploit.com This Metasploit module exploits an SSTI injection in Atlassian Confluence servers. A specially crafted...

Risky Biz News: 3CX was a supply chain attack in a supply chain attack

0
A short podcast updating listeners on the security news of the last few days, as prepared...

BookingWizz 6.0.1 Information Disclosure

0
Authored by indoushka BookingWizz version 6.0.1 suffers from an information leakage vulnerability. Change Mirror Download ====================================================================================================================================| # Title : BookingWizz v6.0.1 sensitive information...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an authentication bypass vulnerability through a direct and...

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Insecure Direct Object Reference

0
Authored by LiquidWorm | Site zeroscience.mk Elber Signum DVB-S/S2 IRD for Radio Networks version 1.999 suffers from an unauthenticated device configuration and client-side hidden functionality...

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass

0
Authored by LiquidWorm | Site zeroscience.mk Elber Cleber/3 Broadcast Multi-Purpose Platform version 1.0.0 suffers from an authentication bypass vulnerability through a direct and unauthorized access...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json