Editor_In_Chief

Editor_In_Chief

Last seen: 2 days ago

An award-winning political journalist formerly with Nigerian Tribune Newspaper with almost two decades reporting news across the globe. I expose and report on government censorship and focus on freedom of speech as a vehicle to be truly free from the oppression of government dictatorship.

Member since May 13, 2019 [email protected]

Following (7)

Followers (1)

Exploits
Smogcloud - Find Cloud Assets That No One Wants Exposed

Smogcloud - Find Cloud Assets That No One Wants Exposed

Find exposed AWS cloud assets that you did not know you had. A comprehensive asset...

Exploits
Gitrecon - OSINT Tool To Get Information From A Github Profile And Find GitHub User'S Email Addresses Leaked On Commits

Gitrecon - OSINT Tool To Get Information From A Github...

OSINT tool to get information from a github profile and find GitHub user's email...

Latest Threats
Ransomware Attack Foils IoT Giant Sierra Wireless

Ransomware Attack Foils IoT Giant Sierra Wireless

The ransomware attack has impacted the IoT manufacturer's production lines across...

Latest Threats
Microsoft Exchange Servers See ProxyLogon Patching Frenzy

Microsoft Exchange Servers See ProxyLogon Patching Frenzy

Vast swathes of companies were likely compromised before patches were applied, so...

Latest Threats
Purple Fox Malware Targets Windows Machines With New Worm Capabilities

Purple Fox Malware Targets Windows Machines With New Worm...

A new infection vector from the established malware puts internet-facing Windows...

Latest Threats
Security Analysis Clears TikTok of Censorship, Privacy Accusations  

Security Analysis Clears TikTok of Censorship, Privacy...

TikTok’s source code is in line with industry standards, security researchers say.

Exploits
Kraker - Distributed Password Brute-Force System That Focused On Easy Use

Kraker - Distributed Password Brute-Force System That Focused...

Kraker is a distributed password brute-force system that allows you to run and manage...

Latest Threats
Office 365 Cyberattack Lands Disgruntled IT Contractor in Jail

Office 365 Cyberattack Lands Disgruntled IT Contractor...

A former IT contractor is facing jailtime after a retaliatory hack into a company’s...

Exploits
CTF-Party - A Ruby Library To Enhance And Speed Up Script/Exploit Writing For CTF Players

CTF-Party - A Ruby Library To Enhance And Speed Up Script/Exploit...

A library to enhance and speed up script/exploit writing for CTF players (or security...

Latest Threats
MangaDex Site Offline Following Hacking Incident

MangaDex Site Offline Following Hacking Incident

A cyberattacker taunted the site about open security vulnerabilities, prompting...

Latest Threats
Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

Hobby Lobby Exposes Customer Data in Cloud Misconfiguration

The arts-and-crafts retailer left 138GB of sensitive information open to the public...

Latest Threats
Podcast: Microsoft Exchange Server Attack Onslaught Continues

Podcast: Microsoft Exchange Server Attack Onslaught Continues

Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet’s...

Latest Threats
Energy Giant Shell Is Latest Victim of Accellion Attacks

Energy Giant Shell Is Latest Victim of Accellion Attacks

Attackers accessed personal and business data from the company’s legacy file-transfer...

Exploits
Godehashed - Tool That Uses The Dehashed.Com API To Search For Compromised Assets

Godehashed - Tool That Uses The Dehashed.Com API To Search...

A golang tool that uses the dehashed.com API to search for compromised assets. Results...

Latest Threats
Critical Security Bugs Fixed in Virtual Learning Software

Critical Security Bugs Fixed in Virtual Learning Software

Remote ed software bugs give attackers wide access student computers, data.

Latest Threats
Adobe Fixes Critical ColdFusion Flaw in Emergency Update

Adobe Fixes Critical ColdFusion Flaw in Emergency Update

Attackers can leverage the critical Adobe ColdFusion flaw to launch arbitrary code...

Latest Threats
CopperStealer Malware Targets Facebook and Instagram Business Accounts

CopperStealer Malware Targets Facebook and Instagram Business...

A previously undocumented password and cookie stealer has been compromising accounts...

Politics & Governance
Facebook Treats Punk Rockers Like Crazy Conspiracy Theorists, Kicks Them Offline

Facebook Treats Punk Rockers Like Crazy Conspiracy Theorists,...

Facebook announced last year that it would be banning followers of QAnon, the conspiracy...

Politics & Governance
Pasco County’s Sheriff Must End Its Targeted Child Harassment Program

Pasco County’s Sheriff Must End Its Targeted Child Harassment...

In September 2020, the Tampa Bay Times revealed a destructive “data-driven” policing...

Exploits
ProxyLogon - PoC Exploit for Microsoft Exchange

ProxyLogon - PoC Exploit for Microsoft Exchange

PoC Exploit for Microsoft Exchange Launche Original PoC: https://github.com/testanull...

Politics & Governance
Video Hearing Tuesday: EFF Tells California Lawmakers to Crack Down on License Plate Data Collection

Video Hearing Tuesday: EFF Tells California Lawmakers to...

SB 210 Would Require Data Destruction Within 24 Hours, Among Other Reforms Sacramento...

Exploits
Subcert - An Subdomain Enumeration Tool, That Finds All The Subdomains From Certificate Transparency Logs

Subcert - An Subdomain Enumeration Tool, That Finds All...

Subcert is a subdomain enumeration tool, that finds all the valid subdomains from...

Politics & Governance
EFF Joins Effort to Restrict Automated License Plate Readers in California

EFF Joins Effort to Restrict Automated License Plate Readers...

One year ago, the California State Auditor released a damning report on the use...

Exploits
Vajra - A Highly Customi zable Target And Scope Based Automated Web Hacking Framework To Automate Boring Recon Tasks

Vajra - A Highly Customi zable Target And Scope Based Automated...

An automated web hacking framework for web applications Detailed insight about Vajra...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here