Cyber Security

All cyber security related news by The Hack Post can be found on this page.

Wordpress Theme "dance-studio" Vulnerable to Arbitrary Shell Upload

WordPress Theme “dance-studio” Vulnerable to Arbitrary Shell Upload

A vulnerability in the WordPress theme "dance-studio" has been discovered allowing attackers to upload malicious files like a shell, onto the targeted website. The exploit was posted to the exploit database,...
WordPress REST API 0day Exploit is Out: Patch your CMS Now!

WordPress REST API 0day Exploit is Out: Patch your CMS Now!

WordPress fixed three safety defects almost a week ago. However, only just recently did the organization address the unknown 0day exploits that allowed unauthorized hackers to edit and alter the content...
Nokia Leading Security with Multi-Layer Cloud Protection That Protects Users on Many Levels

Nokia Leading Security with Multi-Layer Cloud Protection That Protects Users on Many Levels

ESPOO, FINLAND– Many businesses believe that the cloud is the way of the future because it’s faster and easier for large numbers of people to navigate. The problem is that many...

Joomla! 3.6.4 Admin TakeOver Exploit is Now Public

A few days ago, a Joomla exploit has surfaced on the internet affecting the version 3.6.4 by allowing an attacker to take administrative control over the website using the Content Management...
Google Project Shield

Google Introduces Project Shield in the Hopes of Protecting the World’s News from Digital...

Denial of service attacks (DDoS) is a very serious issue for most websites. There are a huge variety of hacks that people use:Internet control message protocol floods SYN flood attacks Teardrop attacks Peer-to-peer attacks Permanent...
WordPress SQL Injection

WordPress < 4.8.3 Vulnerable To SQL Injection (SQLI) Exploit

A security researcher named "Anthony Ferrara" has found a critical SQL Injection (SQLI) vulnerability in the WordPress CMS. According to WordPress team, the vulnerability exists in all previous versions of the...
An image of the Drupal that is vulnerable to an RCE Exploit.

Drupal RCE Exploit Has Been Released for the “Drupalgeddon2” Vulnerability

In just a short span of time, after the working Drupal RCE Exploit is released to the general public, the hackers have begun exploiting the recently revealed vital vulnerability in Drupal....
Hackers Can Hijack Anyones Twitter Tweets (Legally)

Hackers Can Hijack Anyone’s Twitter Tweets (Legally)

Hackers can hijack tweets using a python script, created by misterch0c that runs through any twitter account to allow anyone to hijack any twitter accounts or users tweet.When the script is...