CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Microsoft Releases October 2024 Security Updates Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor...
Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies CISA has observed cyber threat actors leveraging unencrypted...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Ransomware Group: PLAY VICTIM NAME: Courtney Construction NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: KILLSEC VICTIM NAME: rudrakshahospitalscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: PLAY VICTIM NAME: Misionero Vegetables NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: PLAY VICTIM NAME: Henneman Engineering NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: PLAY VICTIM NAME: Steel Art Signs NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: STORMOUS VICTIM NAME: AOSense NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,...
Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and trust me,...
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to...
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt...
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge...
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel...
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and...
A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages...
The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly...
Ransomware Group: BLACKBASTA VICTIM NAME: casepartscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: BLACKBASTA VICTIM NAME: gfm-ukcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: STORMOUS VICTIM NAME: Ascires NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: MEOW VICTIM NAME: Astero NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: ELDORADO VICTIM NAME: compra-arubacom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...