What’s the Difference Between CSPM & SSPM?
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to fly under...
The Deep, Dark Web – The Underground – is a haven for cybercriminals, teeming with tools and resources to launch...
A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming tool known as...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
A novel credential-stealing malware called Zaraza bot is being offered for sale on Telegram while also using the popular messaging...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of a high-severity Android vulnerability believed to have been exploited...
Image: Norebbo The LockBit ransomware gang has created encryptors targeting Macs for the first time, likely becoming the first major...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
RoyalRansomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:623db25256a5734d1207787d269d05b2, discovery, persistence, ransomware, spyware, stealerMD5: b4586f74cee9669371f2e64b6678641dSHA1: f855ec126871e24159ac9e0bd438cc08d2eb1770ANALYSIS DATE: 2023-04-16T16:20:15ZTTPS: T1222, T1053, T1005, T1081,...
Score: 8 MALWARE FAMILY: ransomwareTAGS:ransomware, spyware, stealerMD5: 88a69bbc9bfdc9edc263a2024ca1d78dSHA1: f973e09d77438bc01a93e310eb4513f24acc601eANALYSIS DATE: 2023-04-16T16:12:17ZTTPS: T1005, T1081 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:lumma, family:rhadamanthys, family:smokeloader, family:vidar, botnet:623db25256a5734d1207787d269d05b2, botnet:pub1, botnet:sprg, backdoor, collection, discovery, evasion, persistence, ransomware, spyware,...
Score: 10 MALWARE FAMILY: discoveryTAGS:discovery, evasion, persistence, ransomware, trojanMD5: aed07e5e91a732956dba1b37a9a6b48bSHA1: df1e7a31f48fec1bbc8cadcd3570a6ba7144c7e7ANALYSIS DATE: 2023-04-16T15:24:05ZTTPS: T1018, T1112, T1031, T1089, T1107, T1490, T1562,...
Vice Society Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
A new Android malware named 'Goldoson' has infiltrated Google Play through 60 legitimate apps that collectively have 100 million downloads....
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and...
Source: NCR Aloha NCR is suffering an outage on its Aloha point of sale platform after being hit by an...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...