CACTUS Ransomware Victim: www[.]isc[.]dk
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Researching the hard problems in hardware security What’s hardware security all about? The CEO of Intel, Pat Gelsinger, recently asked...
The Spanish police have arrested one of the alleged leaders of the 'Kelvin Security' hacking group, which is believed to...
Valve has reportedly fixed an HTML injection flaw in CS2 that was heavily abused today to inject images into games...
Toyota Financial Services (TFS) is warning customers it suffered a data breach, stating that sensitive personal and financial data was...
Cold storage and logistics giant Americold has confirmed that over 129,000 employees and their dependents had their personal information stolen...
A critical severity vulnerability in a WordPress plugin with more than 90,000 installs can let attackers gain remote code execution...
The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
Interpol has repeated warnings that human traffickers are fueling an online fraud epidemic in South East Asia and beyond, after...
Organizations are still exposed to critical vulnerabilities in Log4j, two years after a maximum severity bug was found in the...
One of the most prolific ransomware-as-a-service (RaaS) groups operating today has suffered online disruption which intelligence experts have attributed to...
The threat actor known as Lazarus Group has been observed targeting the Log4Shell vulnerability (CVE-2021-44228) in a new series of...
Europol has issued a new warning regarding an emerging trend in organized crime involving the use of Bluetooth trackers. Originally designed...
The EU reached a provisional deal on the AI Act on December 8, 2023, following record-breaking 36-hour-long ‘trilogue’ negotiations between...
HIBP In December 2023, the inflatable and balloon fetish videos website InflateVids suffered a data breach. The incident exposed over...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...