The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.1.4. This is due to a lack of user validation before changing a password. This makes it possible for unauthenticated attackers to change the password of arbitrary users, including administrators, if the attacker knows the username of the victim.

ALL

13

Our research findings are for everyone’s benefit.

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.

DNSleaktest.com offers a simple test to determine if you DNS requests are being leaked which may represent a critical privacy threat. The test takes only a few seconds and we show you how you can simply fix the problem.

Elastic Security Labs empowers security teams across the globe with novel security intelligence research and free to use tools.

Community Of Hackers & Security Professionals.

Learn ethical hacking skills with hands-on labs and education from cyber security experts.

Browse indicators of compromise (IOCs) on ThreatFox.

Hacker, red teamer, researcher. Likes to write infosec-focussed Python tools. This is my personal blog containing research on topics I find interesting, such as (Azure) Active Directory internals, protocols and vulnerabilities.

Think out of the box. This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with examples.

The latest cybersecurity trends, best practices, security vulnerabilities, and more.

vsociety is a social community for security professionals to collaborate on vulnerability solutions and network with security peers.

Free VIN lookup. Learn the vehicle history, mileage, inspections, damage, thefts, archive photos! Get a free VIN lookup with autoDNA. Get your VIN lookup for free and see what your vehicle hides

The most popular and trusted Bitcoin block explorer and crypto transaction search engine.

Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine created for security analysts, journalists, security companies, and everyday people to help secure accounts and provide insight on compromised assets. Free breach alerts & breach notifications.

DNSlytics provides the ultimate online investigation tool. See detailed information about every IP address, domain name and provider. Perform network tests like DNS lookup, email testing and WHOIS lookups.

A free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.

A search engine and data archive. Search Tor, I2P, data leaks and the public web by email, domain, IP, CIDR, Bitcoin address and more.

Free tool to search for a Domain, Facebook Vanity URL, Twitter Account, YouTube ID and Pinterest ID at the same time.

PeekYou's best free people search engine allows you to find and contact anyone online. Find social links, photos, work history, alumni info, family and more.

Perplexity AI unlocks the power of knowledge with information discovery and sharing.

Phind is an intelligent assistant for programmers. With Phind, you'll get the answer you're looking for in seconds instead of hours.

Fast people search by name, phone, or address on Radaris. Search people directory and learn about people - background check, phone, address, email, reverse phone lookup, people's reviews, and public records.

People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free.

SPYTOX is the authority in online people search. With comprehensive personal information, including cell phone numbers, for over 275 million people nationwide. SPTOX provides answers to over 3 million searches every day is one of the top ranked domain for human information.

Free people search engine. Find Addresses, Phones, Emails, and Much More!

Official TruthFinder website. Try our People Search, Reverse Phone Lookup, or Address Lookup today to search people online. It's simple to get started, just enter a name or phone number and click search. Social Media, Photos, Police Records, Background Checks, Civil Judgments, Contact Information and Much More!

Search Social NetworksFind someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs. 600+ sites Supported! Largest Reverse User Search Online!

Free VIN number decoder for any cars.

The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories. Binarly is the world's most advanced automated firmware supply chain security platform. Using cutting-edge machine-learning techniques, Binarly identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.

The latest news and articles about cybersecurity, critical event management, asset tracking, and secure Internet of Things including automotive from BlackBerry.

Through the years, ESET and its researchers have been credited with many discoveries and have scored accolades for many of their research works.

An IP address blacklist for webmasters and sysadmins to report IP addresses engaging in abusive behavior on their networks, or check the report history of any IP.

Thoughts, perspectives, and industry commentary from the Cobalt team. Insights for security leaders, pentesters and developers — all in one place. Learn more about how the world of App- and InfoSec is changing every day.

This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques.

Get up-to-date insights and the scoop on new tools and tricks to help you improve your security program.

Blog from Adam Chester, Hacker and InfoSec Researcher.

Practical and Affordable Cyber Security Training.

Deep Instinct's Deep Learning Blog keeps professionals up to date on news and trends in the sophisticated deep learning, AI and cybersecurity industries. As our experts uncover critical finders, we find it only necessary to keep you informed. From perspective on recent threats to best practices in security we cover it.

Malcore is designed to automate malware analysis and was designed by Internet 2.0’s top malware analysts Thomas Perkins. Malcore’s sandbox powered by AI is designed with speed and scalability. Malcore automates malware analysis, checks files and links.

13