New Attack Technique Exploits Microsoft Management Console Files
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan...
Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the...
INC Ransom Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in...
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with...
The organization managing the world’s largest stockpile of plutonium has pleaded guilty to all criminal charges, in a first-of-its-kind case...
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
RedJuliett, a likely Chinese state-sponsored group, conducted cyber espionage campaigns targeting Taiwan from November 2023 to April 2024, according to...
Poland’s new government appears to be ramping up its investigation into allegations that the previous administration used notorious commercial spyware...
Security researchers have warned against Rafel, an open-source remote administration tool (RAT) targeting Android devices. The investigation by Check Point Research...
HIBP In June 2024, Advance Auto Parts confirmed they had suffered a data breach which was posted for sale to...
Phone Scammers Impersonating CISA Employees Impersonation scams are on the rise and often use the names and titles of government...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Twenty Industrial Control Systems Advisories CISA released twenty Industrial Control Systems (ICS) advisories on June 13, 2024. These...
CISA Releases Six Industrial Control Systems Advisories CISA released six Industrial Control Systems (ICS) advisories on June 11, 2024. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs) Today, CISA released Barriers to Single...
Juniper Networks Releases Security Bulletin for Juniper Secure Analytics Juniper Networks released a security bulletin to address multiple vulnerabilities affecting...
CISA and Partners Release Guidance for Modern Approaches to Network Access Security Today, CISA, in partnership with the Federal Bureau...