[FOG] – Ransomware Victim: Oberlin Cable Co-op (oberlin[.]net)
Ransomware Group: FOG VICTIM NAME: Oberlin Cable Co-op (oberlinnet) NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: FOG VICTIM NAME: Oberlin Cable Co-op (oberlinnet) NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: QILIN VICTIM NAME: Ministry of Foreign Affairs of Ukraine NOTE: No files or stolen information are by RedPacket...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Vulnerability Summary: CVE-2024-13147 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Merkur Software B2B...
Vulnerability Summary: CVE-2024-12097 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel...
Vulnerability Summary: CVE-2024-11216 Authorization Bypass Through User-Controlled Key, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in PozitifIK...
Vulnerability Summary: CVE-2024-13471 The DesignThemes Core Features plugin for WordPress is vulnerable to unauthorized access of data due to a...
Vulnerability Summary: CVE-2025-1463 The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to,...
Vulnerability Summary: CVE-2025-22212 A SQL injection vulnerability in the ConvertForms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers...
Vulnerability Summary: CVE-2025-23416 Path traversal may lead to arbitrary file deletion. The score without least privilege principle violation is as...
Vulnerability Summary: CVE-2025-21095 Path traversal may lead to arbitrary file download. The score without least privilege principle violation is as...
Vulnerability Summary: CVE-2023-38693 Lucee Server (or simply Lucee) is a dynamic, Java based, tag and scripting language used for rapid...
Vulnerability Summary: CVE-2025-24494 Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed...
Vulnerability Summary: CVE-2024-11035 Carbon Black Cloud Windows Sensor, prior to 4.0.3, may be susceptible to an Information Leak vulnerability, which...
Vulnerability Summary: CVE-2025-27411 REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file...
Vulnerability Summary: CVE-2025-27412 REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to...
Vulnerability Summary: CVE-2025-24521 External XML entity injection allows arbitrary download of files. The score without least privilege principle violation is...