Badsecrets – A Library For Detecting Known Secrets Across Many Web Frameworks
A pure python library for identifying the use of known or very weak cryptographic secrets across a variety of platforms....
A pure python library for identifying the use of known or very weak cryptographic secrets across a variety of platforms....
Introducing SOC Multi-tool, a free and open-source browser extension that makes investigations faster and more efficient. Now available on the...
Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of...
Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three...
Progress Software has announced the discovery and patching of a critical SQL injection vulnerability in MOVEit Transfer, popular software used...
Researchers have issued a warning about an emerging and advanced form of voice phishing (vishing) known as "Letscall." This technique...
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and...
Progress Software Releases Service Pack for MOVEit Transfer Vulnerabilities Progress Software has released a Service Pack to address three newly...
CISA Adds One Known Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of...
Progress Software has announced the discovery and patching of a critical SQL injection vulnerability in MOVEit Transfer, popular software used...
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and...
Cybersecurity agencies have warned about the emergence of new variants of the TrueBot malware. This enhanced threat is now targeting...
Cybersecurity agencies have warned about the emergence of new variants of the TrueBot malware. This enhanced threat is now targeting...
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and...
Ransomware attacks are a major problem for organizations everywhere, and the severity of this problem continues to intensify. Recently, Microsoft's...
Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three...
As technology advances and organizations become more reliant on data, the risks associated with data breaches and cyber-attacks also increase....
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...