Atomic Stealer Rings In The New Year With Updated Version
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users....
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users....
During this past year, we have seen an increase in the use of malicious ads (malvertising) and specifically those via...
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server to its...
Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners within...
The open-source Bitwarden password manager has announced that all users can now log into their web vaults using a passkey...
Popular athleisure clothing brand Halara is investigating a data breach after the alleged data of almost 950,000 customers was leaked...
Framework Computer disclosed a data breach exposing the personal information of an undisclosed number of customers after Keating Consulting Group,...
A little over 6,700 WordPress websites using a vulnerable version of the Popup Builder plugin have been infected with the...
Microsoft has released a PowerShell script to automate updating the Windows Recovery Environment (WinRE) partition in order to fix CVE-2024-20666,...
Two vulnerabilities impacting the POST SMTP Mailer WordPress plugin, an email delivery tool used by 300,000 websites, could help attackers take...
The Finish National Cybersecurity Center (NCSC-FI) is informing of increased Akira ransomware activity in December, targeting companies in the country and wiping backups....
CISA Adds Six Known Exploited Vulnerabilities to Catalog CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Fortinet Releases Security Updates for FortiOS and FortiProxy Fortinet has released a security update to address a vulnerability in FortiOS...
Microsoft Releases Security Updates for Multiple Products Microsoft has released security updates to address vulnerabilities in multiple products. A cyber threat...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on January 9, 2024. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Juniper Networks Releases Security Bulletin for Junos OS and Junos OS Evolved Juniper Networks has released a security advisory to address...
CISA Releases Nine Industrial Control Systems Advisories CISA released nine Industrial Control Systems (ICS) advisories on January 11, 2024. These...