CACTUS Ransomware Victim: www[.]unitex[.]com
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Researchers from four American universities have developed a new GPU side-channel attack that leverages data compression to leak sensitive visual...
Hackers are breaching GitHub accounts and inserting malicious code disguised as Dependabot contributions to steal authentication secrets and passwords from...
Johnson Controls International has suffered what is described as a massive ransomware attack that encrypted many of the company devices,...
Google has patched the fifth Chrome zero-day vulnerability exploited in attacks since the start of the year in emergency security...
A stream of malicious npm and PyPi packages have been found stealing a wide range of sensitive data from software...
US and Japanese law enforcement and cybersecurity agencies warn of the Chinese 'BlackTech' hackers breaching network devices to install custom...
Fake Bitwarden sites are pushing installers purportedly for the open-source password manager that carry a new password-stealing malware that security...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Set of python scripts which perform different ways of command execution via WMI protocol. Blog Post https://whiteknightlabs.com/2023/06/26/navigating-stealthy-wmi-lateral-movement/ Usage wmiexec_scheduledjob.py Is...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Security researchers have identified infrastructure belonging to a threat actor now tracked as ShadowSyndicate, who likely deployed seven different ransomware families...
In password-based authentication, end-users confirm their identity using login credentials, commonly a unique username, and a secret password. These credentials...
The Hospital for Sick Children, more commonly known as SickKids, is among healthcare providers that were impacted by the recent breach...
A new APT hacking group named 'AtlasCross' targets organizations with phishing lures impersonating the American Red Cross to deliver backdoor...
Google has assigned a new CVE ID (CVE-2023-5129) to a libwebp security vulnerability exploited as a zero-day in attacks and...
Hackers are utilizing a new trick of using zero-point fonts in emails to make malicious emails appear as safely scanned...
Hackers are actively exploiting a high-severity vulnerability in Openfire messaging servers to encrypt servers with ransomware and deploy cryptominers. Openfire...
Sony says that it is investigating allegations of a cyberattack this week as different hackers have stepped up to claim responsibility for...