[QILIN] – Ransomware Victim: Windsor Door
Ransomware Group: QILIN VICTIM NAME: Windsor Door NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: QILIN VICTIM NAME: Windsor Door NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: NOVA VICTIM NAME: Eurofins Scientific (Healthcare) NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: INCRANSOM VICTIM NAME: TOMEI GROUP Inc NOTE: No files or stolen information are by RedPacket Security. Any legal...
Co-op Group's chief executive officer has confirmed that all 6.5 million of the organization's members had their data stolen during...
Column We don't want to believe what we deeply understand: nothing is really deleted, and someone, somewhere can (and probably...
Opinion On June 10, social network Bluesky announced that in 15 days it would introduce age verification for UK users,...
The founder of SaaS business development outfit SaaStr has claimed AI coding tool Replit deleted a database despite his instructions...
The UK government is proposing to "ban" public sector organizations and critical national infrastructure from paying criminal operators behind ransomware...
Company Name: curl Company HackerOne URL: https://hackerone.com/curl Submitted By:lyb_unaffiliatedLink to Submitters Profile:https://hackerone.com/lyb_unaffiliated Report Title:on the implications of permitting procedural cullingReport...
Company Name: AWS VDP Company HackerOne URL: https://hackerone.com/aws_vdp Submitted By:muhammad_kasimLink to Submitters Profile:https://hackerone.com/muhammad_kasim Report Title:XSS on Amazon Aquisition: elementalReport Link:https://hackerone.com/reports/3205667Date...
Company Name: curl Company HackerOne URL: https://hackerone.com/curl Submitted By:cmeister2Link to Submitters Profile:https://hackerone.com/cmeister2 Report Title:curl ASSERTs when accessing an LDAP URLReport...
CVE-2025-4388 Reflected XSS in marketplace-app-manager-web. CVE-2025-4388 Reflected XSS in marketplace-app-manager-web. Researcher: Renatto Engagement: National Aeronautics and Space Administration (NASA) -...
HTTP Verb Tampering Leads to Authorization Bypass on /archive/exist/team/ Directory HTTP Verb Tampering Leads to Authorization Bypass on /archive/exist/team/ Directory...
Vulnerability Summary: CVE-2025-7311 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7309 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7310 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7313 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7312 IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7319 IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7322 IrfanView CADImage Plugin DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7321 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7320 IrfanView CADImage Plugin DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Vulnerability Summary: CVE-2025-7308 IrfanView CADImage Plugin DWG File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers...
Autonomous AI adversaries once a concept confined to science fiction are fast becoming a reality in cybersecurity. In the near...