The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases
Dark Utilities “C2-as-a-Service” is attracting a growing number of customers searching for a command-and-control for their campaigns. The popularity of the...
Dark Utilities “C2-as-a-Service” is attracting a growing number of customers searching for a command-and-control for their campaigns. The popularity of the...
The U.S. DHS warns of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. The Department of Homeland Security...
US Critical Infrastructure Security Agency (CISA) adds a recently disclosed flaw in the Zimbra email suite to its Known Exploited...
peetch is a collection of tools aimed at experimenting with different aspects of eBPF to bypass TLS protocol protections. Currently,...
In May 2022, the survey website QuestionPro was the target of an extortion attempt relating to an alleged data breach....
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
A threat actor, tracked as TAC-040, exploited Atlassian Confluence flaw CVE-2022-26134 to deploy previously undetected Ljl Backdoor. Cybersecurity firm Deepwatch...
NAME VMware Workspace ONE Access, Identity Manager and vRealize Automation code execution Platforms Affected:VMware vRealize Automation 7.6 VMware Workspace ONE...
NAME Node.js ctv-appletv3-router module code execution Platforms Affected:Node.js ctv-appletv3-routerRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js ctv-appletv3-router module could allow a remote attacker...
NAME Quest KACE Systems Management Appliance (SMA) security bypass Platforms Affected:Quest KACE Systems Management Appliance 12.0Risk Level:9.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Quest...
NAME D-Link DIR820LA1 devices buffer overflow Platforms Affected:D-Link DIR820LA1 FW106B02Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION D-Link DIR820LA1 devices are vulnerable to a...
NAME Node.js chawla-init-3 module code execution Platforms Affected:Node.js chawla-init-3Risk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js chawla-init-3 module could allow a remote attacker...
NAME BookWyrm brute force Platforms Affected:BookWyrm BookWyrm 0.4.4Risk Level:9.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION BookWyrm is vulnerable to a brute force attack, caused...