Popular Podcasts

Crypto Currency Tracker (CCT) 9.5 Add Administrator

0
Authored by 0xBr Crypto Currency Tracker (CCT) versions 9.5 and below suffer from a flaw that allows an administrative account to be added without authentication. advisories...

Cyber Vulnerabilities & Exploits

The latest hacker news

FBI Analyst Charged With Stealing Counterterrorism and Cyber Threat Info

0
By: Ravie Lakshmanan The U.S. Department of Justice (DoJ) indicted an employee of the Federal Bureau of Investigation (FBI) for illegally removing numerous national security...

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.

0
By: î ‚Nov 29, 2023î „NewsroomCyber Attack / Hacking The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a cyber attack that involved...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation

0
Attackers have compromised more than 8,000 subdomains from well-known brands and institutions to mount a sprawling phishing campaign that sends malicious emails numbering in...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$64,158.00
Ethereum(ETH)
$3,153.17
XRP(XRP)
$0.53
Bitcoin Cash(BCH)
$477.14
Litecoin(LTC)
$83.66
Stellar(XLM)
$0.113971
Monero(XMR)
$119.60
Tezos(XTZ)
$1.02
EOS(EOS)
$0.86

Risky Biz News: AU, UK, US sanction Russian behind Medibank ransomware attack

0
A short podcast updating listeners on the security news of the last few days, as prepared...
dark reading threat intel and cybersecurity news

Cyberattack Shuts Down French Hospital

0
French Health Ministry authorities were forced to shut down operations and transfer critically ill patients following a weekend cyberattack on a hospital outside Paris. Minister...

North Korean Hackers target UN Security Members

0
New UN Security Council report reveals repeated targeting of UN Security Council officials over the past year By Catalin Cimpanu  Today's security threats have expanded in scope...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

LRMS PHP 1.0 SQL Injection / Shell Upload

0
Authored by nu11secur1ty LRMS PHP version 1.0 suffers from remote shell upload and multiple remote SQL injection vulnerabilities. Change Mirror Download ## Titles: LRMS-PHP-by-oretnom23-v1.0 hat-trick1. Multiple-SQLi2. File...

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json