Pro-Hamas Hacktivists Targeting Israeli Entities with Wiper Malware
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst...
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________JumpServer information disclosurePlatforms Affected:JumpServer JumpServer 3.7.2Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________JumpServer could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Man Group D-Tale cross-site scriptingPlatforms Affected:Man Group D-Tale 3.6.0Risk Level:6.1Exploitability:HighConsequences:Gain Access DESCRIPTION__________Man Group D-Tale is vulnerable to cross-site scripting, caused...
NAME__________Stellar rs-stellar-strkey denial of servicePlatforms Affected:Stellar rs-stellar-strkey 0.0.7Risk Level:5.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Stellar rs-stellar-strkey is vulnerable to a denial of service,...
NAME__________Linux Kernel denial of servicePlatforms Affected:Linux Kernel 6.5.9Risk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Linux Kernel is vulnerable to a denial of service,...
NAME__________CryptoES information disclosurePlatforms Affected:CryptoES CryptoES 2.0.4Risk Level:7.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________CryptoES could allow a remote attacker to obtain sensitive information, caused by...