[QILIN] – Ransomware Victim: hallmarknameplate[.]com
Ransomware Group: QILIN VICTIM NAME: hallmarknameplatecom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: QILIN VICTIM NAME: hallmarknameplatecom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: QILIN VICTIM NAME: cpshawaiinet NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: QILIN VICTIM NAME: ccllabelcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-45997 Sourcecodester Web-based Pharmacy Product Management System v.1.0 has a file upload vulnerability. An attacker can upload a...
Vulnerability Summary: CVE-2025-5277 aws-mcp-server MCP server is vulnerable to command injection. An attacker can craft a prompt that once accessed...
Vulnerability Summary: CVE-2025-3357 IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary...
Vulnerability Summary: CVE-2025-48734 Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This...
Vulnerability Summary: CVE-2025-4134 Lack of file validation in do_update_vps in Avast Business Antivirus for Linux 4.5 on Linux allows local...
Vulnerability Summary: CVE-2025-32801 Kea configuration and API directives can be used to load a malicious hook library. Many common configurations...
Vulnerability Summary: CVE-2025-45343 An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker to execute arbitrary code via the editing...
Vulnerability Summary: CVE-2025-32802 Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to...
Vulnerability Summary: CVE-2024-51453 IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow a remote attacker to traverse directories on the...
Vulnerability Summary: CVE-2024-38341 IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 through 6.1.0.0, and 6.2.0.0 through 6.2.0.1 uses weaker than...
Ransomware Group: ARKANA VICTIM NAME: Infinox NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: schoenundendresde NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: gruposancristobalcommx NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: BLACKSUIT VICTIM NAME: metromontcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: BLACKSUIT VICTIM NAME: Inns of Aurora NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: DATACARRY VICTIM NAME: Alliance Healthcare IT NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: SAFEPAY VICTIM NAME: hennertanklinescom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SAFEPAY VICTIM NAME: radsportscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...