www.cyberreport.io Open in urlscan Pro
2606:4700:20::ac43:483b  Public Scan

Submitted URL: https://cyberreport.io/
Effective URL: https://www.cyberreport.io/
Submission Tags: phishingrod
Submission: On September 23 via api from DE — Scanned from DE

Form analysis 3 forms found in the DOM

GET ./search/

<form method="GET" action="./search/">
  <div class="input-group">
    <input type="text" name="q" class="form-control" placeholder="Search">
    <span class="input-group-addon"><button type="submit" class="btn-link"><span class="fa fa-search"></span></button></span>
  </div>
</form>

GET ./search/

<form method="GET" action="./search/">
  <div class="input-group">
    <input type="text" name="q" class="form-control" placeholder="Search">
    <span class="input-group-addon"><button type="submit" class="btn-link"><span class="fa fa-search"></span></button></span>
  </div>
</form>

POST https://feedburner.google.com/fb/a/mailverify

<form action="https://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow"
  onsubmit="if (!window.__cfRLUnblockHandlers) return false; window.open('http://feedburner.google.com/fb/a/mailverify?uri=', 'popupwindow', 'scrollbars=yes,width=550,height=520');return true">
  <div class="form-group">
    <label for="email">Subscribe to Newsletter</label>
    <div class="input-group">
      <input type="text" name="email" id="email" class="form-control" placeholder="Email">
      <input type="hidden" value="CyberReport-GlobalCollectionOfCyberSecurityNews" name="uri">
      <input type="hidden" name="loc" value="en_US">
      <span class="input-group-btn">
        <button type="submit" class="btn btn-warning"><i class="fa fa-envelope"></i></button>
      </span>
    </div>
  </div>
</form>

Text Content

We use cookies to track usage and preferences.I Understand


CATEGORIES

 * Cyber Security
 * Threat Intelligence
 * Cryptocurrency
 * Technology
 * Cyber Security Videos
   * IppSec Videos
   * John Hammond
   * All Cyber Security Videos
 * How-to
 * 
 * Our Mission
 * Top Ten Cyber Security Tips
 * Cyber Threat Maps
 * Online Streamers
 * Contact





 * Home
 * Contact
 * Our Mission
 * Top Ten Cyber Security Tips
 * Cyber Threat Maps
 * Online Streamers

 * 


Toggle navigation Categories
 * Cyber Security
 * Threat Intelligence
 * Cryptocurrency
 * Technology
 * Cyber Security Videos
   * IppSec Videos
   * John Hammond
   * 
   * All Cyber Security Videos
 * How-to

CYBER SECURITY

Cyber Security
Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture
extensive traffic across various network protocols in bit-flip and



Cyber Security Move over, Cobalt Strike. Splinter’s the new post-exploit menace
in...

No malware crew linked to this latest red-teaming tool yet Attackers are using
Splinter, a new...


Cyber Security The Latest Email Scams: Key Trends to Look Out For

Amid the numerous instruments that have augmented our digital communication and
commerce...


Cyber Security Apple's latest macOS release is breaking security software,
network...

PLUS: Payer of $75M ransom reportedly identified; Craigslist founder becomes
security...



THREAT INTELLIGENCE

Threat Intelligence
Versa Networks Releases Advisory for a Vulnerability in Versa
Director, CVE-2024-45229

Versa Networks has released an advisory for a vulnerability () affecting Versa
Director. A cyber threat actor could exploit this vulnerability to exercise
unauthorized REST APIs. CISA urges organizations to apply necessary updates,
hunt for any malicious activity, report any positive findings...



Threat Intelligence New cybersecurity advisory highlights defense-in-depth
strategies

In 2023, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a
red team...


Threat Intelligence Ubuntu Security Notice USN-7027-1

Ubuntu Security Notice 7027-1 - It was discovered that Emacs incorrectly handled
input...


Threat Intelligence Ivanti Releases Admin Bypass Security Update for Cloud
Services...

Ivanti has released a security update to address an admin bypass vulnerability (
CVE-2024-8963 )...



CRYPTOCURRENCY

Cryptocurrency
BNB Price Tops $600: Can the Rally Continue?

BNB price started a fresh increase above the $550 resistance zone. The price is
now consolidating near $600 and might aim for more gains. BNB price started a
fresh increase above the $550 resistance zone. The price is now trading below
$580 and the 100-hourly simple moving average....



Cryptocurrency Only 43% of users qualified for Hamster Kombat’s season 1 airdrop

The Hamster Kombat team said that 2.3 million users were banned from the game
for cheating. 


Cryptocurrency Ethereum Price Breaks $2,600: Is More Upside Ahead?

Ethereum price started a fresh upward move above the $2,500 resistance. ETH is
now gaining pace...


Cryptocurrency Kamala Harris finally breaks silence on crypto: Report

Kamala Harris has spoken publicly about crypto for the first time, pledging
support for the...



TECHNOLOGY

Technology
What is CRM Integration? Key Concepts and Strategies (2024)

Discover how CRM integration with other systems can enhance data
synchronization, automate workflows, and improve reporting.



Technology NIST Funds Climate Measurements Center of Excellence at the...

White Oak River, North Carolina: Wetlands like these are useful for preventing
floods,...


Technology Court Overturns €1.5 Billion EU Antitrust Fine Against Google

The fine marked the third major antitrust penalty against the search giant by
the EU in the last...


Technology New Smoke Alarms Are Better at Detecting Fires but Still Beep for...

NIST researcher Emma Veley heats up a pan of bacon in the lab to see how long it
takes to set...



CYBER SECURITY VIDEOS

IppSec Videos
HackTheBox - SolarLab

00:00 - Introduction 01:05 - Start of nmap 02:50 - Discovering Guest can read
files on SMB, using mount to copy all the files 08:30 - Grabbing usernames and
passwords from the excel document so we can use them for spraying 15:45 - Taking
a look at port 6791 to see ReportHub, using FFUF to spray...



Cyber Security Videos My best cybersecurity advice

About Infosec Infosec’s mission is to put people at the center of cybersecurity.
We help IT and...


Cyber Security Videos Launch your cybersecurity career with a Career Immersive
Boot Camp

Are you ready to transform your career? Whether you're a professional from
another industry...


Cyber Security Videos National Engineers' Day 2024 | Celebrating Bharat's
Engineering...

Join us in celebrating National Engineers' Day 2024, where we honor Bharat's
engineering legends....



RECENTLY ADDED | HOURLY UPDATES!

Cyber Security Certainly: Open-source offensive security toolkit

Certainly is an open-source offensive security toolkit designed to capture
extensive traffic across various network protocols in bit-flip and

Cryptocurrency BNB Price Tops $600: Can the Rally Continue?

BNB price started a fresh increase above the $550 resistance zone. The price is
now consolidating near $600 and might aim for more gains. BNB price started a
fresh increase above the $550...

Cryptocurrency Only 43% of users qualified for Hamster Kombat’s season 1 airdrop

The Hamster Kombat team said that 2.3 million users were banned from the game
for cheating. 

Cyber Security Move over, Cobalt Strike. Splinter’s the new post-exploit menace
in town

No malware crew linked to this latest red-teaming tool yet Attackers are using
Splinter, a new post-exploitation tool, to wreak havoc in victims' IT
environments after initial infiltration,...

How-to Hands-on With New iPhone’s Electrically-Released Adhesive

There’s a wild new feature making repair jobs easier (not to mention less messy)
and iFixit covers it in their roundup of the iPhone 16’s repairability:
electrically-released adhesive ....

Cyber Security The Latest Email Scams: Key Trends to Look Out For

Amid the numerous instruments that have augmented our digital communication and
commerce experiences over time, email remains a staple for everything, from
confirming purchases to life-changing...

Cryptocurrency Ethereum Price Breaks $2,600: Is More Upside Ahead?

Ethereum price started a fresh upward move above the $2,500 resistance. ETH is
now gaining pace above $2,600 and might continue to rise. Ethereum started
another increase from the $2,400...

Cryptocurrency Kamala Harris finally breaks silence on crypto: Report

Kamala Harris has spoken publicly about crypto for the first time, pledging
support for the industry while stressing consumer protections.

Cyber Security Apple's latest macOS release is breaking security software,
network connections

PLUS: Payer of $75M ransom reportedly identified; Craigslist founder becomes
security philanthropist, and more Infosec In Brief   Something's wrong with
macOS Sequoia, and it's breaking...

How-to The Tiny Toolkit Manifesto

Most of us have some form of an on-the-go toolkit, but how much thought have we
put into its contents? here’s a community of people who put a lot of thought
into this, and EMF Camp have put up...

Cyber Security Videos HackTheBox - SolarLab

00:00 - Introduction 01:05 - Start of nmap 02:50 - Discovering Guest can read
files on SMB, using mount to copy all the files 08:30 - Grabbing usernames and
passwords from the excel document so we...

Cryptocurrency Samourai Wallet forked into &#039;Ashigaru&#039; Open Source
Project

According to the website, Ashigaru uses CoinJoin and other mechanisms to shield
users from analytical heuristics and tracking.

No More
1
Crypto Whales Buy $228 Million In XRP Following $5 Price Prediction
2 My best cybersecurity advice
3 Catizen (CATI) Soars 10% Following Multiple Exchange...
4 Apple’s macOS Sequoia Update Breaks Security Tools
5 Ethereum Price Breaks $2,600: Is More Upside Ahead?

NEWSLETTER

Subscribe to Newsletter


BE IN TOUCH




Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast
as possible. Our goal is to collect these sources and place them all in one area
for quick reading. If the information is important to the viewer and they want
more information, we forward them to the direct source. The more people talking
about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact
form. We will review the information and get back to you.

 * Incident Response Tool List
 * Blue Team Tool List
 * Privacy Policy


All Rights Reserved #1 Source for Cyber Security News, Reports and Threat
Intelligence
Powered By The Internet!!!!