LockBit Ransomware Now Targeting Apple macOS Devices
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple's macOS...
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple's macOS...
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-45789A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause execution...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on April 11, 2023. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
Fortinet Releases April 2023 Vulnerability Advisories Fortinet has released its April 2023 Vulnerability Advisories(link is external) to address vulnerabilities affecting multiple...
Juniper Networks Releases Security Updates Juniper Networks has released security updates to address vulnerabilities affecting Junos OS(link is external), Paragon...
Shifting the Balance of Cybersecurity Risk: Security-by-Design and Default Principles Shifting the Balance of Cybersecurity Risk: Security-by-Design and Default Principles...
CISA Releases Sixteen Industrial Control Systems Advisories CISA released sixteen Industrial Control Systems (ICS) advisories on April 13, 2023. These...
Microsoft Releases Guidance for the BlackLotus Campaign Microsoft has released Guidance for investigating attacks using CVE-2022-21894: The BlackLotus Campaign(link is...
IRS Warns of New Tax Scams The Internal Revenue Service (IRS) has issued a reminder urging taxpayers to be vigilant...
CISA Releases Software Bill of Materials (SBOM) Sharing Lifecycle Report CISA has released the SBOM Sharing Lifecycle Report to the cybersecurity...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
KARAKURT RANSOMWARE NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
Ex-Conti ransomware members have teamed up with the FIN7 threat actors to distribute a new malware family named 'Domino' in...
QBot malware is now distributed in phishing campaigns utilizing PDFs and Windows Script Files (WSF) to infect Windows devices. Qbot...
A new Android trojan called ‘Chameleon’ has been targeting users in Australia and Poland since the start of the year,...
The Chinese state-sponsored hacking group APT41 was found abusing the GC2 (Google Command and Control) red teaming tool in data...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script...
Uses python3.10, Debian, python-Nmap, and flask framework to create a Nmap API that can do scans with a good speed...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...