Popular Podcasts

EU strikes political agreement on Cyber Solidarity Act in wake of...

0
The European Council and negotiators from the European Parliament reached on Tuesday night a provisional agreement on the proposed Cyber Solidarity Act, which aims...

Cyber Vulnerabilities & Exploits

The latest hacker news

New ‘HrServ.dll’ Web Shell Detected in APT Attack Targeting Afghan Government

0
By: Nov 25, 2023NewsroomCyber Attack / Threat Intelligence An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in...

Warning — Deadbolt Ransomware Targeting ASUSTOR NAS Devices

0
By: Ravie Lakshmanan ASUSTOR network-attached storage (NAS) devices have become the latest victim of Deadbolt ransomware, less than a month after similar attacks singled out...

The UNC2529 Triple Double: A Trifecta Phishing Campaign

0
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks this threat actor as...

Learning & Cyber Education

Why You Need Cybersecurity to Protect Your Greatest Assets

0
By: Tina Martin Why You Need Cybersecurity to Protect Your Greatest Assets When it comes to cybersecurity, you can never be too careful. After all, not...

Breaches & Data Leaks

BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail...

0
By: Jan 23, 2024NewsroomCyber Crime / Dark Web Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his...

Cybercrime

Follow Us and Subscribe to Our Social Media

69FollowersFollow
906FollowersFollow
12SubscribersSubscribe

Cryptocurrency Prices

Name Price
Bitcoin(BTC)
$64,607.00
Ethereum(ETH)
$3,159.92
XRP(XRP)
$0.53
Bitcoin Cash(BCH)
$477.97
Litecoin(LTC)
$84.77
Stellar(XLM)
$0.114146
Monero(XMR)
$120.63
Tezos(XTZ)
$1.02
EOS(EOS)
$0.85

Third-Party APIs: How to Prevent Enumeration Attacks

0
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. When organizations use APIs – the next frontier in...

NFT court orders could become a norm in crypto-related litigation: Lawyers

0
Nonfungible tokens (NFTs) are becoming an increasingly popular solution for serving defendants in blockchain-based crimes that would otherwise be unreachable, according to crypto lawyers.The...
dark reading threat intel and cybersecurity news

‘Fancy Lazarus’ Criminal Group Launches DDoS Extortion Campaign

0
The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom.A cybercriminal...

Security & Hacking Tools

Adalanche: Active Directory ACL Visualizer and Explorer

0
I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...

Domhttpx – A Google Search Engine Dorker With HTTP Toolkit Built With Python, Can...

0
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time. Usage Flags This...

Sniffle – A Sniffer For Bluetooth 5 And 4.X LE

0
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful features, including: Support for BT5/4.2 extended...

Cerbrutus – Network Brute Force Tool, Written In Python

0
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services. COMING SOON: SMB,...

tsharkVM – Tshark + ELK Analytics Virtual Machine

0
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...

Daily Exploits & CVE Vulnerabilites

LRMS PHP 1.0 SQL Injection / Shell Upload

0
Authored by nu11secur1ty LRMS PHP version 1.0 suffers from remote shell upload and multiple remote SQL injection vulnerabilities. Change Mirror Download ## Titles: LRMS-PHP-by-oretnom23-v1.0 hat-trick1. Multiple-SQLi2. File...

Palo Alto PAN-OS Command Execution / Arbitrary File Creation

0
Authored by Kr0ff Palo Alto PAN-OS versions prior to 11.1.2-h3 command injection and arbitrary file creation exploit. advisories | CVE-2024-3400 Change Mirror Download # Exploit Title: Palo Alto...

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

0
Authored by sfewer-r7, remmons-r7 | Site metasploit.com This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...

Recent Tweets By The Cyber Post

Twitter feed is not available at the moment.
Error decoding the Instagram API json