[BABUK2] – Ransomware Victim: forvismazars[.]com[.]fr ( mazars[.]fr )
Ransomware Group: BABUK2 VICTIM NAME: forvismazarscomfr ( mazarsfr ) NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: BABUK2 VICTIM NAME: forvismazarscomfr ( mazarsfr ) NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: ARCUSMEDIA VICTIM NAME: HYPONAMIRU NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: ARCUSMEDIA VICTIM NAME: HYPERNOVA TELECOM NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesWindows High RiskRemote Code Execution Elevation of Privilege Spoofing Denial...
A vulnerability has been identified in Apple Products. A remote attacker could exploit this vulnerability to trigger remote code execution...
Vulnerability Summary: CVE-2025-2018 Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to...
Vulnerability Summary: CVE-2025-1707 The Review Schema plugin for WordPress is vulnerable to Local File Inclusion in all versions up to,...
Vulnerability Summary: CVE-2025-2208 A vulnerability, which was classified as problematic, has been found in aitangbao springboot-manager 3.0. This issue affects...
Vulnerability Summary: CVE-2025-2017 Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to...
Vulnerability Summary: CVE-2025-2210 A vulnerability has been found in aitangbao springboot-manager 3.0 and classified as problematic. Affected by this vulnerability...
Vulnerability Summary: CVE-2025-2233 Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass...
Vulnerability Summary: CVE-2025-2211 A vulnerability was found in aitangbao springboot-manager 3.0 and classified as problematic. Affected by this issue is...
Vulnerability Summary: CVE-2025-2209 A vulnerability, which was classified as problematic, was found in aitangbao springboot-manager 3.0. Affected is an unknown...
Vulnerability Summary: CVE-2025-2213 A vulnerability was found in Castlenet CBW383G2N up to 20250301. It has been declared as problematic. This...
Vulnerability Summary: CVE-2025-2212 A vulnerability was found in Castlenet CBW383G2N up to 20250301. It has been classified as problematic. This...
Ransomware Group: FUNKSEC VICTIM NAME: unimoreit NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
In an era dominated by digital interconnectedness, supply chain security has emerged as a critical concern for organizations worldwide. It's...
X (formerly Twitter) faced significant disruptions due to a DDoS attack. A pro-Palestine group claims responsibility for the cyber onslaught....
CISA warns that critical vulnerabilities in Ivanti software are being actively exploited, urging organizations to patch these vulnerabilities promptly. Recently,...
In a significant move, New York Attorney General Letitia James has initiated a lawsuit against Allstate's National General unit, claiming...
In 2024, a staggering 95% of data breaches were linked to human error, highlighting critical vulnerabilities within organizations. According to...
The CyberFirst Girls competition has seen a record number of participants this year, showcasing the rising interest of girls in...
A significant cyber-attack campaign has emerged, targeting Colombian government institutions since November 2024. This campaign, attributed to the threat group...