8 Base Ransomware Victim: Comtek Advanced Structures, a Latecoere Company
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Simpson Manufacturing disclosed via a SEC 8-K filing a cybersecurity incident that has caused disruptions in its operations, which are...
Hackers are once again abusing LinkedIn Smart Links in phishing attacks to bypass protection measures and evade detection in attempts...
This article is written by Rob Sobers, Varonis. Microsoft Copilot has been called one of the most powerful productivity tools...
A new malware has been posing as a legitimate caching plugin to target WordPress sites, allowing threat actors to create...
Microsoft says a Chinese-backed threat group tracked as 'Storm-0062' (aka DarkShadow or Oro0lxy) has been exploiting a critical privilege escalation...
Microsoft Defender for Endpoint now uses automatic attack disruption to isolate compromised user accounts and block lateral movement in hands-on-keyboard...
The BianLian extortion group claims to have stolen 210GB of data after breaching the network of Air Canada, the country's...
Google on Tuesday announced the ability for all users to set up passkeys by default, five months after it rolled...
Certain online risks to children are on the rise, according to a recent report from Thorn, a technology nonprofit whose...
Amazon Web Services (AWS), Cloudflare, and Google on Tuesday said they took steps to mitigate record-breaking distributed denial-of-service (DDoS) attacks...
A sophisticated Magecart campaign has been observed manipulating websites' default 404 error page to conceal malicious code in what's been...
A previously undocumented threat actor of unknown provenance has been linked to a number of attacks targeting organizations in the...
Microsoft has released its Patch Tuesday updates for October 2023, addressing a total of 103 flaws in its software, two...
Passwords are at the core of securing access to an organization's data. However, they also come with security vulnerabilities that...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a high-severity flaw in Adobe Acrobat Reader to its...
More than 17,000 WordPress websites have been compromised in the month of September 2023 with malware known as Balada Injector,...
Microsoft has linked the exploitation of a recently disclosed critical flaw in Atlassian Confluence Data Center and Server to a...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoacronis -- agentLocal privilege escalation due to improper soft link handling. The...
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records....
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...