8 Base Ransomware Victim: MBS Equipment TTI
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-24489 A vulnerability has been discovered in the customer-managed ShareFile storage zones...
Interrupted classes, disrupted planning, and postponed events – IT outages have a big impact on modern university life. But as...
Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems. Air-gapped systems...
Security researchers are warning of increased phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures...
In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called...
American apparel retailer Hot Topic is notifying customers about multiple cyberattacks between February 7 and June 21 that resulted in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of state hackers exploiting two flaws in Ivanti's Endpoint Manager...
Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) as a zero-day...
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook business...
An NHS trust has been reprimanded by the UK’s data protection regulator after it was discovered that staff had been...
Security researchers have uncovered new loader malware under active development which uses multiple mechanisms to evade detection.Proofpoint said it detected...
The boss of one of Europe’s largest outsourcing companies has announced his retirement, several months after the firm suffered a...
Unit 42 researchers have uncovered another phishing campaign designed to take over Facebook business accounts using a newly identified infostealer...
Canon has raised concerns over potential security risks linked to the disposal of inkjet printers. In a security advisory published on...
A new and sophisticated malware campaign named “P2Pinfect” has been observed targeting publicly-accessible deployments of the Redis data store.According to a...
A new report has shed light on critical cloud risks, with a focus on the growing threat of cloud tech...
CISA Releases Analysis of FY22 Risk and Vulnerability Assessments CISA has released an analysis and infographic detailing the findings from...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog,...
CISA and Partners Release Joint Cybersecurity Advisory on Preventing Web Application Access Control Abuse The Australian Signals Directorate’s Australian Cyber...
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on July 27, 2023. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog,...