CISA: CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
Abuse of the Service Location Protocol May Lead to DoS Attacks The Service Location Protocol (SLP, RFC 2608(link is external))...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for...
Discover, filter, and prioritize security risks and vulnerabilities impacting your code. Bearer is a static application security testing (SAST) tool...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: cabb11a8e237ff7233e19b9cb6cc829dSHA1: ffe487aba123018573a275adfe98c44d1cee9c77ANALYSIS DATE: 2023-04-29T15:35:17ZTTPS: T1060, T1112, T1222, T1053,...
Score: 10 MALWARE FAMILY: persistenceTAGS:persistence, ransomwareMD5: 09250d8b8323c62fb59941b458fa70d1SHA1: da5f6347207257139ac82b50bc8276de9c1afd9eANALYSIS DATE: 2023-04-29T15:39:47ZTTPS: T1112, T1060, T1012, T1120, T1082, T1107, T1490 ScoreMeaningExample10Known badA malware...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:redline, family:smokeloader, family:vidar, botnet:1616034f091df9fd0229bc38dd17597f, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:potok 2, botnet:pub1, backdoor, discovery, evasion, infostealer, persistence, ransomware,...
Score: 10 MALWARE FAMILY: amadeyTAGS:family:amadey, family:djvu, family:icedid, family:redline, family:smokeloader, family:vidar, botnet:1616034f091df9fd0229bc38dd17597f, botnet:5cb879265de0011bfc7588d5d251aee6, botnet:potok 2, botnet:pub1, campaign:252847557, backdoor, banker, discovery, evasion,...
Score: 7 MALWARE FAMILY: ransomwareTAGS:ransomwareMD5: b55fca9a67bd38321a51a8724b61ee12SHA1: 99e8e1961755df056c605ca052e92da3ddb0a3d3ANALYSIS DATE: 2023-04-29T15:56:53ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known damaging...
Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:vidar, botnet:5cb879265de0011bfc7588d5d251aee6, discovery, persistence, ransomware, spyware, stealerMD5: 1420395c269bb059c6f60d8faee97088SHA1: 1c3662586dcf5451f479d7c1812a22cc9db25dbdANALYSIS DATE: 2023-04-29T16:22:32ZTTPS: T1012, T1082, T1005, T1081,...
Programme HackerOne Nextcloud Nextcloud Submitted by aslfv aslfv Report Name collision of shared folders Full Report A considerable amount...
Programme HackerOne Nextcloud Nextcloud Submitted by brthnc brthnc Report Reference fetch can saturate the server bandwidth for 10 seconds Full...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Black Basta Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...