CVE Alert: CVE-2024-52812
Vulnerability Summary: CVE-2024-52812 LF Edge eKuiper is an internet-of-things data analytics and stream processing engine. Prior to version 2.0.8, auser...
Vulnerability Summary: CVE-2024-52812 LF Edge eKuiper is an internet-of-things data analytics and stream processing engine. Prior to version 2.0.8, auser...
Vulnerability Summary: CVE-2025-27616 Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Prior to...
Vulnerability Summary: CVE-2025-27925 Nintex Automation 5.6 and 5.7 before 5.8 has insecure deserialization of user input. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2025-27926 In Nintex Automation 5.6 and 5.7 before 5.8, the K2 SmartForms Designer folder has configuration files (web.config)...
Vulnerability Summary: CVE-2025-27924 Nintex Automation 5.6 and 5.7 before 5.8 has a stored XSS issue associated with the "Navigate to...
Vulnerability Summary: CVE-2025-27610 Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.13, 3.0.14, and 3.1.12,...
Ransomware Group: BABUK2 VICTIM NAME: wapdagovpk By Babuk Locker 20 NOTE: No files or stolen information are by RedPacket Security....
Ransomware Group: BABUK2 VICTIM NAME: lexmarkcom Company NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: BABUK2 VICTIM NAME: fndegovbr brazilian government NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: FUNKSEC VICTIM NAME: isee-egcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The number of unauthorized Cobalt Strike copies has seen an impressive 80% drop thanks to intensified security efforts. Efforts to...
In Switzerland, operators of critical infrastructure will soon face legal obligations to report cyber-attacks, enhancing national cybersecurity measures. Operators of...
A Texas developer faces a potential decade-long prison sentence after being convicted of intentional damage to protected computers at his...
The UK AI research sector is increasingly at risk from nation-state hackers aiming to exploit groundbreaking advancements in artificial intelligence....
A significant surge in malicious software packages exploiting system vulnerabilities has raised alarm bells among cybersecurity experts. A rise in...
SIM swapping fraud is surging in the Middle East, revealing alarming strategies that cybercriminals employ to target victims. A surge...
Ransomware Group: BABUK2 VICTIM NAME: forvismazarscomfr ( mazarsfr ) By Babuk Locker 20 NOTE: No files or stolen information are...
Ransomware Group: FOG VICTIM NAME: Wilkinson Rogers (wilkinsonrogerscom) NOTE: No files or stolen information are by RedPacket Security. Any legal...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Nine Industrial Control Systems Advisories CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These...
CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices CISA—in...
CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on February 6, 2025. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Five Known Exploited Vulnerabilities to Catalog CISA has added five vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...