CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Nuclear Pond is used to leverage Nuclei in the cloud with unremarkable speed, flexibility, and perform internet wide scans for...
KubeStalk is a tool to discover Kubernetes and related infrastructure based attack surface from a black-box perspective. This tool...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
Score: 10 MALWARE FAMILY: evasionTAGS:evasion, persistence, ransomwareMD5: 8effcc3b16c124f3ba46fe8e86947105SHA1: d6b4f76d9bfbaae0fc944adb8cb9dd8f487050efANALYSIS DATE: 2023-04-24T14:32:46ZTTPS: T1012, T1082, T1112, T1060, T1158, T1491, T1120 ScoreMeaningExample10Known badA...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 18d171bc6fea9f638c4d76698b2b7d7fSHA1: ab1aa609f0395ab1a410a8aeef94d9fc6f9b0fb6ANALYSIS DATE: 2023-04-24T15:22:21ZTTPS: T1005, T1081, T1012, T1082,...
Score: 7 MALWARE FAMILY: evasionTAGS:evasion, ransomwareMD5: b209c6502e2fecd11fbdeb4fe602e90aSHA1: 5abd3b562aa38db2a1f14ec0997a5e9d6fa4fc9eANALYSIS DATE: 2023-04-24T17:23:51ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 9d416753c2a076fa65105a7d34fbe1cbSHA1: 52e01796a7c5f0492d832f86708d4bfab0f2b690ANALYSIS DATE: 2023-04-24T15:43:58ZTTPS: T1005, T1081, T1012, T1060,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:raccoon, family:rhadamanthys, family:smokeloader, family:vidar, botnet:5c24dc0e9726fcc756a18038ae4e0e67, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:fc8427198f843d72c1aa8a66db1a98f3, botnet:pub1, backdoor, collection, discovery, evasion, persistence, ransomware,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:raccoon, family:rhadamanthys, family:smokeloader, family:vidar, botnet:5c24dc0e9726fcc756a18038ae4e0e67, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:fc8427198f843d72c1aa8a66db1a98f3, botnet:pub1, backdoor, collection, discovery, evasion, persistence, ransomware,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 9e152141b4c83bd73477b543860668dfSHA1: 841b2caff78d9dd1e8ad6b6a1493c9892d698dceANALYSIS DATE: 2023-04-24T17:32:45ZTTPS: T1082, T1012, T1005, T1081,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:raccoon, family:rhadamanthys, family:smokeloader, family:vidar, botnet:5c24dc0e9726fcc756a18038ae4e0e67, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:fc8427198f843d72c1aa8a66db1a98f3, botnet:pub1, backdoor, collection, discovery, evasion, persistence, ransomware,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 8729348bb91d4712cde74e6ae4949bbeSHA1: 996a94a902d668107532ba251f8224d6b7225ddcANALYSIS DATE: 2023-04-24T17:25:53ZTTPS: T1012, T1082, T1053, T1005,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, stealerMD5: 413e3d55867e81e00b0fc53b335e0c8aSHA1: bef6e9491bd8fc6489808c1eebe11d20c638297bANALYSIS DATE: 2023-04-24T17:27:59ZTTPS: T1222, T1082, T1053, T1130, T1112,...
Promoting fake software downloads on search engines is a go-to tactic for cybercriminals. A recent discovery by cybersecurity experts has...
Threat actors are employing a previously undocumented "defense evasion tool" dubbed AuKill that's designed to disable endpoint detection and response...
The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering intelligence in Central Asia, fresh...
Threat actors have been observed leveraging a legitimate but outdated WordPress plugin to surreptitiously backdoor websites as part of an...
A recent review by Wing Security, a SaaS security company that analyzed the data of over 500 companies, revealed some...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...