LockBit 2.0 Ransomware Victim: aref[.]government[.]bg
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
A sophisticated cyberespionage campaign, dubbed Operation CuckooBees, conducted by the China-linked Winnti group remained undetected since at least 2019. Researchers...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
Multi cloud iam permissions enumeration tool. Currently covers: AWS GCP Azure Oracle Description Cliam is a simple cloud permissions identifier....
Mozilla Releases Security Updates for Firefox and Firefox ESR Mozilla has released security updates to address vulnerabilities in Firefox and...
F5 Releases Security Advisories Addressing Multiple Vulnerabilities F5 has released security advisories on vulnerabilities affecting multiple products, including various versions...
Researchers have found a vulnerability in a popular C standard library in IoT products that could allow attackers to perform...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
CISA Adds Five Known Exploited Vulnerabilities to Catalog CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
Small businesses and startups are known to face some extra challenges when it comes to cybersecurity. Because they don’t have...
Pro-Ukraine hackers are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen Russian and Belarusian websites. Pro-Ukraine hackers, likely linked...
Researchers from Trellix linked multiple ransomware strains to the North Korea-backed APT38 group. The ransomware was employed in attacks on...
LDAPFragger is a Command and Control tool that enables attackers to route From network segment A, run LDAPFragger --cshost <Cobalt...
The wacky world of ape jpegs are at the heart of yet another increasingly bizarre internet scam, which contains malware,...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
A security researcher discovered that samples of Conti, REvil, LockBit ransomware were vulnerable to DLL hijacking. The security researcher John...
NAME Apple - Multiple Platforms Affected:MultipleRisk Level:highCVE Type:Unspecified DESCRIPTION CVE-2022-22616 is an unspecified vulnerability impacting Apple macOS Monterey versions 12.2.1...
NAME Linux Kernel Organization - Linux Kernel Platforms Affected:Linux KernelRisk Level:lowCVE Type:Use after free DESCRIPTION CVE-2022-28796 is a use after...
NAME Mozilla Firefox code execution Platforms Affected:Mozilla Firefox 99Risk Level:8.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Mozilla Firefox could allow a remote attacker to...
NAME Mozilla Firefox code execution Platforms Affected:Mozilla Firefox 99 Mozilla Firefox ESR 91.8Risk Level:8.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Mozilla Firefox could allow...
NAME Multiple TRUMPF TruTops products security bypass Platforms Affected:TRUMPF TruTops Boost 13.05 TRUMPF TruTops Boost 13.08.21 TRUMPF TruTops Fab 22.05...
NAME OpenSSL command execution Platforms Affected:OpenSSL OpenSSL 1.0.2 OpenSSL OpenSSL 1.1.1 OpenSSL OpenSSL 3.0.0 OpenSSL OpenSSL 3.0.1 OpenSSL OpenSSL 3.0.2...