[SAFEPAY] – Ransomware Victim: realschule-karlstadt[.]org
Ransomware Group: SAFEPAY VICTIM NAME: realschule-karlstadtorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: realschule-karlstadtorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: bristolhosecom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: theoverheaddoorcocom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: awo-giessenorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: liberty-townshipcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: rusindustriescom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: mcslde NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: hohmannoilandplumbingcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: moffett-towers-clubcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: welcometosedgebrookcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: pzsarchitectscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: cs-groupllccom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-45988 Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4...
Vulnerability Summary: CVE-2025-45984 Blink routers BL-WR9000 V2.4.9, BL-AC1900 V1.0.2, BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 V1.0.5, BL-LTE300 V1.2.3, BL-F1200_AT1 V1.0.0, BL-X26_AC8 V1.2.8, BLAC450M_AE4...
Vulnerability Summary: CVE-2025-29902 Remote code execution that allows unauthorized users to execute arbitrary code on the server machine. Affected Endpoints:...
Vulnerability Summary: CVE-2025-45987 Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4...
Vulnerability Summary: CVE-2025-45986 Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4...
Vulnerability Summary: CVE-2025-45985 Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4...
Vulnerability Summary: CVE-2025-28388 OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2025-28384 An issue in the /script-api/scripts/ endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal....
Vulnerability Summary: CVE-2025-46096 Directory Traversal vulnerability in solon v.3.1.2 allows a remote attacker to conduct XSS attacks via the solon-faas-luffy...
Vulnerability Summary: CVE-2025-46060 Buffer Overflow vulnerability in TOTOLINK N600R v4.3.0cu.7866_B2022506 allows a remote attacker to execute arbitrary code via the...
Ransomware Group: IMNCREW VICTIM NAME: Repremundocomco NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-28389 Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack....