LockBit 3.0 Ransomware Victim: brunoy[.]fr
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend....
Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. “In the Box” dark...
scscanner is tool to read To do List Add multi-processing Add filter status code options Add save to file options...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers...
NAME Veritas NetBackup Flex Scale and Access Appliance privilege escalation Platforms Affected:Veritas Access Appliance 8.0.100 Veritas NetBackup Flex Scale 3.0Risk...
NAME Google Chrome code execution Platforms Affected:Google Chrome 108.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote attacker to...
NAME Node.js snyk module code execution Platforms Affected:Node.js snyk 1.1063.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js snyk module could allow a remote...
NAME Veritas NetBackup Flex Scale and Access Appliance command execution Platforms Affected:Veritas Access Appliance 8.0.100 Veritas NetBackup Flex Scale 3.0Risk...
NAME Veritas NetBackup Flex Scale and Access Appliance privilege escalation Platforms Affected:Veritas Access Appliance 8.0.100 Veritas NetBackup Flex Scale 3.0Risk...
NAME Apache Tapestry code execution Platforms Affected:Apache Tapestry 3.0Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Apache Tapestry could allow a remote attacker to...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-3786A buffer overrun can be triggered in X.509 certificate verification, specifically in...
The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:517, discovery, persistence, ransomware, spyware, stealerMD5: 7735257079f68c14085172a039be19c1SHA1: d309f77684d82dd81896f46a41ebe9882352e459ANALYSIS DATE: 2022-12-04T15:47:11ZTTPS: T1012, T1082, T1005, T1081,...
Score: 10 MALWARE FAMILY: dcratTAGS:family:dcrat, family:djvu, family:smokeloader, family:vidar, botnet:517, backdoor, collection, discovery, infostealer, persistence, ransomware, rat, spyware, stealer, trojanMD5: 9f698fc266aff6e94205f920a615106fSHA1:...
Score: 10 MALWARE FAMILY: wannacryTAGS:family:wannacry, ransomware, wormMD5: 84505f29fde00a6200617e8485d21bd7SHA1: b57d66060afb3b7b0d69901ce3f4c174e7beadb6ANALYSIS DATE: 2022-12-04T15:52:49ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...
Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 60130c36350c6b3d646ec4f3b83c12e2SHA1: 6e22ee16e8e6bed7f75cfee657352650edcccbd8ANALYSIS DATE: 2022-12-04T17:14:38ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...