Cobalt Stike Beacon Detected – 81[.]68[.]160[.]4:8080
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials...
BirDuster is a Python based knockoff of the original DirBuster. BirDuster is a multi threaded Python application designed to brute...
Apple released security updates to address a zero-day bug actively exploited in attacks against Macs and Apple Watch devices. Apple...
Apache Releases Security Advisory for Tomcat The Apache Software Foundation has released a security advisory to address a vulnerability in multiple...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Programme HackerOne Automattic Automattic Submitted by sawrav-chowdhury sawrav-chowdhury Report Site information's Display Name section vulnerable for XSS attacks and HTML...
Programme HackerOne Cloudflare Public Bug Bounty Cloudflare Public Bug Bounty Submitted by albertspedersen albertspedersen Report HTTP Request Smuggling in Transform...
Programme HackerOne lemlist lemlist Submitted by mr23r0 mr23r0 Report Security misconfiguration Full Report
Programme HackerOne curl curl Submitted by sybr sybr Report CVE-2022-27781: CERTINFO never-ending busy-loop Full Report
Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone...
When selecting the right cybersecurity vendor to protect their operations, small- and medium-sized businesses (SMBs) can lean on several third-party...