Iowa’s largest school district confirms ransomware attack, data theft
Des Moines Public Schools, Iowa's largest school district, confirmed today that a ransomware attack was behind an incident that forced...
Des Moines Public Schools, Iowa's largest school district, confirmed today that a ransomware attack was behind an incident that forced...
Three Android apps on Google Play were used by state-sponsored threat actors to collect intelligence from targeted devices, such as...
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on June 13, 2023. These...
CISA Issues BOD 23-02: Mitigating the Risk from Internet-Exposed Management Interfaces Today, CISA issued Binding Operational Directive (BOD) 23-02: Mitigating...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA and NSA Release Joint Guidance on Hardening Baseboard Management Controllers (BMCs) Today, CISA, together with the National Security Agency...
Adobe Releases Security Updates for Multiple Products Adobe has released security updates to address multiple vulnerabilities in Adobe software. An...
CISA and Partners Release Joint Advisory on Understanding Ransomware Threat Actors: LockBit Today, CISA, the Federal Bureau of Investigation (FBI),...
CISA, FBI, and MS-ISAC Update Joint CSA on Progress Telerik Vulnerabilities Today, CISA, the Federal Bureau of Investigation (FBI), and...
CISA Releases Fourteen Industrial Control Systems Advisories CISA released fourteen Industrial Control Systems (ICS) advisories on June 15, 2023. These...
Progress Software Releases Security Advisory for MOVEit Transfer Vulnerability Progress Software has released a security advisory(link is external) for a...
Barracuda Networks Releases Update to Address ESG Vulnerability Barracuda Networks has released an update to their advisory(link is external) addressing...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And...
These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events...
U.S. power and electronics company Eaton patched a sensitive security flaw that enabled an unauthenticated user to remotely access a...
Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple...
A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook, and OneDrive earlier this month to an...
While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices,...
As Threat Actors Continuously Adapt their TTPs in Today's Threat Landscape, So Must You Earlier this year, threat researchers at...
Governmental entities in the Middle East and Africa have been at the receiving end of sustained cyber-espionage attacks that leverage...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...