[RHYSIDA] – Ransomware Victim: The Agency
Ransomware Group: RHYSIDA VICTIM NAME: The Agency NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: RHYSIDA VICTIM NAME: The Agency NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Vulnerability Summary: CVE-2025-24865 The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an...
Vulnerability Summary: CVE-2025-24836 With a specially crafted Python script, an attacker could send continuous startMeasurement commands over an unencrypted Bluetooth...
Vulnerability Summary: CVE-2025-24861 An attacker may inject commands via specially-crafted post requests. Affected Endpoints: No affected endpoints listed. Published Date:...
Vulnerability Summary: CVE-2025-23421 An attacker could obtain firmware files and reverse engineer their intended use leading to loss of confidentiality...
Vulnerability Summary: CVE-2025-26473 The Mojave Inverter uses the GET method for sensitive information. Affected Endpoints: GET method Published Date: 2/13/2025,...
Vulnerability Summary: CVE-2025-25195 Zulip is an open source team chat application. A weekly cron job (added in 50256f48314250978f521ef439cafa704e056539) demotes channels...
Vulnerability Summary: CVE-2024-12054 ZF Roll Stability Support Plus (RSSPlus) is vulnerable to an authentication bypass vulnerability targeting deterministic RSSPlus SecurityAccess...
Vulnerability Summary: CVE-2025-25281 An attacker may modify the URL to discover sensitive information about the target network. Affected Endpoints: No...
Vulnerability Summary: CVE-2024-37602 An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible NULL...
Vulnerability Summary: CVE-2024-37600 An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6 through 2021. A possible stack...
The proliferation of the Internet of Things (IoT) has transformed how we interact with our environment, making our lives more...
North Korea's latest campaign, named Operation Marstech Mayhem, aims to distribute crypto-stealing malware via open source components, significantly threatening crypto...
Seashell Blizzard, a Russian state cyber-actor, has integrated a specialized initial access subgroup to enhance its global reach and compromise...
The Electronic Frontier Foundation (EFF) is spearheading a coalition to block Elon Musk’s Department of Government Efficiency (DOGE) from accessing...
In 2024, losses from romance baiting scams surged 40% year-on-year, highlighting a critical concern in the world of cryptocurrency fraud....
CISA and the FBI have issued a crucial alert emphasizing the importance of eliminating buffer overflow vulnerabilities in software development....
Discover the sophisticated phishing kit called Astaroth, known for its advanced techniques that effectively bypass two-factor authentication (2FA) to compromise...
HIBP In February 2025, the "doxing" website Doxbin was compromised by a group calling themselves "TOoDA" and the data dumped...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
Microsoft Releases January 2025 Security Updates Microsoft released security updates to address vulnerabilities in multiple Microsoft products. A cyber threat...
CISA Releases Microsoft Expanded Cloud Logs Implementation Playbook Today, CISA released the Microsoft Expanded Cloud Logs Implementation Playbook to help...
CISA and Partners Release Call to Action to Close the National Software Understanding Gap Today, CISA—in partnership with the Defense Advanced...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...