Cobalt Strike Beacon Detected – 47[.]120[.]13[.]85:8889
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Ransomware Group: NOVA VICTIM NAME: Computer Ingenuity Associates NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: CICADA3301 VICTIM NAME: Mack Energy Corp NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: QILIN VICTIM NAME: Microf NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2025-43591 InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result...
Vulnerability Summary: CVE-2025-43594 InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in...
Vulnerability Summary: CVE-2025-43592 InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could...
Vulnerability Summary: CVE-2025-49530 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in...
Vulnerability Summary: CVE-2025-47103 InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result...
Vulnerability Summary: CVE-2025-49525 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to...
Vulnerability Summary: CVE-2025-49526 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in...
Vulnerability Summary: CVE-2025-49528 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result...
Vulnerability Summary: CVE-2025-49529 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could...
Vulnerability Summary: CVE-2025-49527 Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result...
Ransomware Group: GLOBAL VICTIM NAME: Emphailcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: INCRANSOM VICTIM NAME: Majestic NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: INCRANSOM VICTIM NAME: TBC NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: INCRANSOM VICTIM NAME: Lamberts Business Systems NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: LYNX VICTIM NAME: Confartigianato Imprese NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Palo Alto Networks Security Advisories /PAN-SA-2025-0013PAN-SA-2025-0013 Chromium: Monthly Vulnerability Update (July 2025)UrgencyMODERATE047910Severity8.6 ·HIGHExploit MaturityATTACKEDResponse EffortMODERATERecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsNONEAutomatableNOUser InteractionACTIVEProduct...
Palo Alto Networks Security Advisories /CVE-2025-0140CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect AppUrgencyMODERATE047910Severity4.3 ·MEDIUMExploit MaturityUNREPORTEDResponse EffortMODERATERecoveryUSERValue DensityDIFFUSEAttack...
Palo Alto Networks Security Advisories /CVE-2025-0139CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) VulnerabilityUrgencyMODERATE047910Severity2.4 ·LOWExploit MaturityUNREPORTEDResponse EffortMODERATERecoveryUSERValue DensityDIFFUSEAttack VectorLOCALAttack ComplexityLOWAttack...