Daily Threat Intelligence – April 03 – 2023
The April 18 tax deadline is here and so are scams surrounding it. A cybercrime group identified as TACTICAL#OCTOPUS was...
Programme HackerOne Kindred Group Kindred Group Submitted by naaash naaash Report Delete messages via IDOR at /mom-api/messages/unibet_@unibet/ Full Report ...
Programme HackerOne Kindred Group Kindred Group Submitted by fransrosen fransrosen Report Full Account Takeover on *.unibet.com due to crossdomain.xml and...
Programme HackerOne 8x8 Bounty 8x8 Bounty Submitted by bababounty99 bababounty99 Report Dangling DNS Record docs.jitsi.net (unsuccessful GSuite takeover) Full Report...
Programme HackerOne Kindred Group Kindred Group Submitted by sw33tlie sw33tlie Report Reverse proxy misconfiguration leads to 1-click account takeover Full...
A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022...
Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems....
The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of...
Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory,...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The below information is fully automated and the information is captured from the BugCrowd Disclosure website. The information was correct...
NAME__________Booking calendar, Appointment Booking System Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress WpDevArt Booking calendar Appointment Booking System Plugin for WordPress...
NAME__________QNAP QTS, QNAP QuTS hero, QNAP QuTScloud, QNAP QVP (QVR Pro appliances), and QNAP QVR command executionPlatforms Affected:Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
A new ransomware gang named 'Money Message' has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data...
Cl0p Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cloud Exploit Framework Usage python3 tc.py -h _______ _ _ _____ _ _ |__ __| | | | / ____|...
apk.sh is a Bash script that makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding...
Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data. It is useful both for...
This tool is a command line utility that allows you to convert any binary file into a QRcode GIF. The...
CMLoot was created to easily find interesting files stored on System Center Configuration Manager (SCCM/CM) SMB shares. The shares are...