Budworm APT Evolves Toolset, Targets Telecoms and Government
The Budworm advanced persistent threat (APT) group, also known as LuckyMouse, Emissary Panda or APT27, has once again demonstrated its active...
The Budworm advanced persistent threat (APT) group, also known as LuckyMouse, Emissary Panda or APT27, has once again demonstrated its active...
The Android banking Trojan Zanubis has taken on a new guise, posing as the official app for the Peruvian governmental...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
️️ Pinkerton is a Python tool created to crawl JavaScript files and search for secrets Installing / Getting started A...
Company Name: b'Mattermost' Company HackerOne URL: https://hackerone.com/mattermost Submitted By:b'zerodivisi0n'Link to Submitters Profile:https://hackerone.com/b'zerodivisi0n' Report Title:b'Reflected XSS in OAuth complete endpoints'Report Link:https://hackerone.com/reports/1502099Date...
In February 2023, Microsoft disclosed its new AI-assisted search engine, Bing Chat, powered by OpenAI's GPT-4. Even though Google has...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________iFolders plugin for WordPress cross-site scriptingPlatforms Affected:WordPress iFolders Plugin for WordPress 1.5.0Risk Level:5.9Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________iFolders plugin for WordPress is vulnerable...
NAME__________Trellix Endpoint Security (ENS) code executionPlatforms Affected:Trellix Trellix Endpoint Security (ENS) 10.7.0Risk Level:5.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Trellix Endpoint Security (ENS) could allow...
NAME__________Cookie Notice & Consent Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Cookie Notice & Consent Plugin for WordPress 1.6.0Risk Level:5.9Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________snappy-java denial of servicePlatforms Affected:snappy-java snappy-java 1.1.10.3Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________snappy-java is vulnerable to a denial of service, caused by...
NAME__________Apple macOS Ventura security bypassPlatforms Affected:Apple macOS Ventura 13.5.0Risk Level:5.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Apple macOS Ventura could allow a local attacker to...
NAME__________Apple macOS Sonoma information disclosurePlatforms Affected:Apple macOS SonomaRisk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Apple macOS Sonoma could allow a remote attacker to obtain...