Researchers Link 3am Ransomware To Conti Royal Cybercrime Gangs
Security researchers analyzing the activity of the recently emerged 3AM ransomware operation uncovered close connections with infamous groups, such as...
Security researchers analyzing the activity of the recently emerged 3AM ransomware operation uncovered close connections with infamous groups, such as...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
VMware Releases Security Advisory for Aria Automation VMware released a security advisory to address a vulnerability (CVE-2023-34063) in Aria Automation....
Incident Response Guide for the WWS Sector Today, CISA, the Federal Bureau of Investigation (FBI), and the Environmental Protection Agency...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
Citrix Releases Security Updates for NetScaler ADC and NetScaler Gateway Citrix released security updates to address vulnerabilities (CVE-2023-6548 and CVE-2023-6549)...
Oracle Releases Critical Patch Update Advisory for January 2024 Oracle released its Critical Patch Update Advisory for January 2024 to...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on January 18, 2024. These...
Drupal Releases Security Advisory for Drupal Core Drupal released a security advisory to address a vulnerability affecting multiple Drupal core versions....
CISA Issues Emergency Directive on Ivanti Vulnerabilities CISA has issued Emergency Directive (ED) 24-01 Mitigate Ivanti Connect Secure and Ivanti...
Atlassian Releases Security Updates for Multiple Products Atlassian released a security advisory to address a vulnerability (CVE-2023-22527) in out-of-date versions...
gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________Oracle Complex Maintenance, Repair, and Overhaul unspecifiedPlatforms Affected:Oracle Complex Maintenance Repair and Overhaul 12.1 Oracle Complex Maintenance Repair and Overhaul...
NAME__________Hyperledger Ursa information disclosurePlatforms Affected:Hyperledger Ursa 0.2 Hyperledger Ursa 0.1Risk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Hyperledger Ursa could allow a remote attacker to...
NAME__________TianoCore EDK II denial of servicePlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________TianoCore EDK II is vulnerable to a denial of service,...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 22.3.2 Oracle GraalVM Enterprise...
NAME__________TianoCore EDK II information disclosurePlatforms Affected:Risk Level:5.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________TianoCore EDK II could allow a remote attacker to obtain sensitive information,...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 21.3.8 Oracle GraalVM Enterprise...
NAME__________Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 21.3.8 Oracle GraalVM Enterprise...
NAME__________TianoCore EDK II information disclosurePlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________TianoCore EDK II could allow a remote attacker to obtain sensitive information,...