Active Exploitation of Critical Vulnerability in Apache Struts 2
Apache has released security updates to address a critical vulnerability (CVE-2023-50164) in Apache Struts 2. The vulnerability has a Common...
Apache has released security updates to address a critical vulnerability (CVE-2023-50164) in Apache Struts 2. The vulnerability has a Common...
CISA and Partners Release Advisory on Russian SVR-affiliated Cyber Actors Exploiting CVE-2023-42793 Today, CISA—along with the U.S. Federal Bureau of...
2023 has seen its fair share of cyber attacks, however there's one attack vector that proves to be more prominent...
The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas...
Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the scheme...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas...
Ukraine's biggest telecom operator Kyivstar has become the victim of a "powerful hacker attack," disrupting customer access to mobile and...
Malware analysis encompasses a broad range of activities, including examining the malware's network traffic. To be effective at it, it's...
2023 has seen its fair share of cyber attacks, however there's one attack vector that proves to be more prominent...
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency...
Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making it...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________QNAP QTS and QuTS hero buffer overflowPlatforms Affected:QNAP QTS QNAP QuTS heroRisk Level:4.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________QNAP QTS and QuTS hero is...
NAME__________Welcart e-Commerce plugin for WordPress directory traversalPlatforms Affected:WordPress Welcart e-Commerce plugin for WordPress 2.8.21 WordPress Welcart e-Commerce plugin for WordPress...
NAME__________Simple Student Attendance System SQL injectionPlatforms Affected:Sourcecodester Simple Student Attendance System 1.0Risk Level:5.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Simple Student Attendance System is vulnerable...
NAME__________Supermicro BMC IPMI directory traversalPlatforms Affected:Supermicro BMC IPMIRisk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Supermicro BMC IPMI could allow a remote attacker to traverse...