North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations
A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence...
A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-20963In WorkSource, there is a possible parcel mismatch. This could lead to...
KARAKURT RANSOMWARE NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
Australian loan giant Latitude Financial Services (Latitude) is warning customers that its data breach is much more significant than initially...
Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to...
Businesses rely on their end-users, but those same users often don't follow the best security practices. Without the right password...
A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the...
Crown Resorts, Australia's largest gambling and entertainment company, has confirmed that it suffered a data breach after its GoAnywhere secure...
A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to...
Programme HackerOne LINE LINE Submitted by tosun tosun Report Path traversal in a Tomcat server Full Report A considerable...
Programme HackerOne LINE LINE Submitted by rioncool22 rioncool22 Report Stored XSS Via Filename On https://partners.line.me/ Full Report A considerable...
Programme HackerOne LINE LINE Submitted by tosun tosun Report Debugging panel exposure Full Report A considerable amount of time...
Programme HackerOne 8x8 8x8 Submitted by shriyanss shriyanss Report speedtest.8x8.com: Enabled Directory Listing Full Report A considerable amount of...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has been linked to...
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited...
Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political, technological, and regulatory changes quickly....
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware...
U.S. President Joe Biden on Monday signed an executive order that restricts the use of commercial spyware by federal government...