LockBit 3.0 Ransomware Victim: norton[.]com[.]ar
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 20.3.8 Oracle GraalVM Enterprise Edition 21.3.4 Oracle GraalVM...
NAME__________Tuleap Community Edition cross-site scriptingPlatforms Affected:Tuleap Community EditionRisk Level:5.5Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Tuleap Community Edition is vulnerable to cross-site scripting, caused by...
NAME__________Fastify @fastify/csrf-protection cross-site request forgeryPlatforms Affected:Fastify @fastify/csrf-protection 4.0.1 Fastify @fastify/csrf-protection 5.0.0 Fastify @fastify/csrf-protection 6.2.0Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fastify @fastify/csrf-protection is vulnerable...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle Java SE 8u361 Oracle Java SE 8u361-perf Oracle Java SE 11.0.18...
NAME__________Secomea GateManager security bypassPlatforms Affected:Jsish Jsish 3.0.11Risk Level:3.4Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Secomea GateManager could allow a local attacker to bypass security restrictions,...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle Java SE 8u361 Oracle Java SE 8u361-perf Oracle Java SE 11.0.18...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle Java SE 8u361 Oracle Java SE 8u361-perf Oracle Java SE 11.0.18...
NAME__________Omron CS/CJ Series information disclosurePlatforms Affected:OMRON SYSMAC CJ2H-CPU6-EIP OMRON SYSMAC CJ2H-CPU6 OMRON SYSMAC CJ1G-CPUP OMRON SYSMAC CS1H-CPUH OMRON SYSMAC CS1G-CPUH...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition unspecifiedPlatforms Affected:Oracle Java SE 8u361 Oracle Java SE 8u361-perf Oracle Java SE 11.0.18...
NAME__________Secomea GateManager security bypassPlatforms Affected:Jsish Jsish 3.0.11Risk Level:6.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Secomea GateManager could allow a local attacker to bypass security restrictions,...
NAME__________Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE unspecifiedPlatforms Affected:Oracle GraalVM Enterprise Edition 20.3.5 Oracle GraalVM...
Print management software provider PaperCut said that it has "evidence to suggest that unpatched servers are being exploited in the...
A new "all-in-one" stealer malware named EvilExtractor (also spelled Evil Extractor) is being marketed for sale for other threat actors...
A new enterprise-targeting malware toolkit called ‘Decoy Dog’ has been discovered after inspecting anomalous DNS traffic that is distinctive from...
Enterprise-level network equipment on the secondary market hide sensitive data that hackers could use to breach corporate environments or to...