Cobalt Strike Beacon Detected – 101[.]43[.]91[.]156:18081
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Ransomware Group: HANDALA VICTIM NAME: Freedom Wood Doors Ltd NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: PLAY VICTIM NAME: Whim Hospitality NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MEDUSA VICTIM NAME: Southwest CARE Center NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: MEDUSA VICTIM NAME: Sermo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: MEDUSA VICTIM NAME: Prosecuting Attorneys' Council of Georgia NOTE: No files or stolen information are by RedPacket Security....
Ransomware Group: NOVA VICTIM NAME: Eurofins NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-53603 In Alinto SOPE SOGo 2.0.2 through 5.12.2, sope-core/NGExtensions/NGHashMap.m allows a NULL pointer dereference and SOGo crash via...
Vulnerability Summary: CVE-2025-26850 The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows...
Vulnerability Summary: CVE-2025-53605 The protobuf crate before 3.7.2 for Rust allows uncontrolled recursion in the protobuf::coded_input_stream::CodedInputStream::skip_group parsing of unknown fields...
Vulnerability Summary: CVE-2025-43711 Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the...
Vulnerability Summary: CVE-2025-53604 The web-push crate before 0.10.3 for Rust allows a denial of service (memory consumption) in the built-in...
Vulnerability Summary: CVE-2025-47228 In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), shell injection in the SSH connection...
Vulnerability Summary: CVE-2023-50786 Dradis through 4.16.0 allows referencing external images (resources) over HTTPS, instead of forcing the use of embedded...
Vulnerability Summary: CVE-2025-7074 A vulnerability classified as problematic has been found in vercel hyper up to 3.4.1. This affects the...
Vulnerability Summary: CVE-2025-47227 In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), the Administrator password reset mechanism is...