CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
WebCopilot is an automation tool designed to enumerate subdomains of the target and detect bugs using different open-source tools. The...
A stealth post-exploitation container. Introduction With the raise in popularity of offensive tools based on eBPF, going from credential stealers...
Ivanti Releases Security Update for Connect Secure and Policy Secure Gateways Ivanti has released a security update to address an...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign since...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by...
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates for...
The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from...
Researchers from Cisco Talos working with the Dutch police obtained a decryption tool for the Tortilla variant of Babuk ransomware and shared intelligence...
The U.S. Cybersecurity and Infrastructure Security Agency has added to its to the Known Exploited Vulnerabilities catalog six vulnerabilities that...
Some organizations victimized by the Royal and Akira ransomware gangs have been targeted by a threat actor posing as a...
Users of the Firefox browser for Android have been reporting that they are seeing a blank page when trying to load...
Nigerian man Olugbenga Lawal (also known as Razak Aolugbengela) was sentenced on Monday to 10 years and one month in...
Addition SEC statement added below. The X account for the U.S. Securities and Exchange Commission was hacked today to issue...
A Chinese state-backed research institute claims to have discovered how to decrypt device logs for Apple's AirDrop feature, allowing the...
The Paraguay military is warning of Black Hunt ransomware attacks after Tigo Business suffered a cyberattack last week impacting cloud...
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently established a technical partnership...