3CX App Supply Chain Attack Leaves Millions at Risk – Urgent Update on the Way!
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on...
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2020-14179Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated...
KARAKURT RANSOMWARE NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used...
Taiwanese hardware vendor QNAP warns customers to secure their Linux-powered network-attached storage (NAS) devices against a high-severity Sudo privilege escalation...
Google's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: 7f7af90a656514364fc769f4ba85ebf1SHA1: 740c283a238c669008b6bf50c2e97edb209c631bANALYSIS DATE: 2023-03-29T14:59:29ZTTPS: T1082, T1005, T1081, T1053,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: a2813d8a07a0bfe6ab8d8f5f3e486bd6SHA1: 2f490cd0ac83ae8455dcc087946334b79f95c5a7ANALYSIS DATE: 2023-03-29T15:24:46ZTTPS: T1012, T1082, T1222, T1005,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: 94c00dfd7eb99d7de68c95f27a3d5854SHA1: 02dc1e168b8e9df3cefc60e3f5d4d0bd850b69c5ANALYSIS DATE: 2023-03-29T15:44:27ZTTPS: T1222, T1060, T1112, T1053,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: bb6f35a6a6a07b124686f9abdd64205bSHA1: ccc9af1cf9221571e6619ad0aa04e294a1efe033ANALYSIS DATE: 2023-03-29T15:53:38ZTTPS: T1222, T1012, T1082, T1053,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:smokeloader, botnet:pub1, backdoor, discovery, persistence, ransomware, trojanMD5: 8b52be4221750ba22b73867d77f514a8SHA1: 45b9ed5aa5947e7d7c761a7ee0f9ca04f3d6a425ANALYSIS DATE: 2023-03-29T15:38:27ZTTPS: T1012, T1120, T1082, T1222,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, botnet:frtrack, botnet:pub1, botnet:rober, backdoor, discovery, evasion, infostealer, persistence, ransomware, spyware,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, botnet:pub1, botnet:rober, backdoor, discovery, evasion, infostealer, persistence, ransomware, spyware, stealer,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: 15a5bb819748cdec8893209495776408SHA1: da3561824dbab0b96c63a5cfd2f364364216ea0aANALYSIS DATE: 2023-03-29T16:31:20ZTTPS: T1060, T1112, T1082, T1053,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: afd8945316aedd2fb57dd654431c26baSHA1: f49694b571523786df36ab5d711dc5ea91ef878fANALYSIS DATE: 2023-03-29T17:52:09ZTTPS: T1005, T1081, T1060, T1112,...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5df88deb5dde677ba658b77ad5f60248, discovery, persistence, ransomware, spyware, stealerMD5: 41c2e6a9aedab7b3015ada13c70a5673SHA1: 62a1c491c10e64d730ad4f589855d8478f017251ANALYSIS DATE: 2023-03-29T16:25:15ZTTPS: T1005, T1081, T1053, T1082,...
Programme HackerOne LINE LINE Submitted by yinmo yinmo Report iOS group chat denial of service Full Report A considerable...
Programme HackerOne LinkedIn LinkedIn Submitted by tushar6378 tushar6378 Report Unauthorized User can View Subscribers of Other Users Newsletters Full Report...
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and...
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French...
The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in...
Malware analysis is an essential part of security researcher's work. But working with malicious samples can be dangerous — it...