Researchers Spot Novel “Deadglyph” Backdoor
Security researchers have revealed a sophisticated new modular backdoor which they believe is the work of the United Arab Emirates’...
Security researchers have revealed a sophisticated new modular backdoor which they believe is the work of the United Arab Emirates’...
A Nigerian extradited to the US had pleaded guilty to his part in a multimillion-dollar business email compromise (BEC) conspiracy.Kosi...
In anticipation of the upcoming 2024 election, major US voting equipment manufacturers have announced an initiative to collaborate with cybersecurity...
Unit 42 researchers have unveiled a web of complex cyber-espionage attacks targeting a government in Southeast Asia. While initially thought...
Hong Kong-based decentralized finance (DeFi) project Mixin Network lost around $200m in cryptocurrency in what could already be one of...
A prolonged and ongoing cyber-espionage campaign by the threat actor known as EvilBamboo (formerly Evil Eye) has been uncovered by...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools like ChatGPT are...
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based...
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat actor codenamed...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the...
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83%...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME__________OpenKnowledgeMaps cross-site scriptingPlatforms Affected:OpenKnowledgeMaps Head Start 7Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________OpenKnowledgeMaps is vulnerable to cross-site scripting, caused by improper validation of...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
TikTok is flooded with videos promoting fake nude celebrity photo leaks used to push referral rewards for the Temu online...
ISC Releases Security Advisories for BIND 9 The Internet Systems Consortium (ISC) has released security advisories to address vulnerabilities affecting...
FBI and CISA Release Advisory on Snatch Ransomware Today, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...