Mac users targeted in new malvertising campaign delivering Atomic Stealer
Summary Malicious ads for Google searches are targeting Mac users Phishing sites trick victims into downloading what they believe is the...
Summary Malicious ads for Google searches are targeting Mac users Phishing sites trick victims into downloading what they believe is the...
Juniper Networks Releases Security Advisory for Junos OS and Junos OS Evolved Juniper Networks has released a security advisory to...
Mozilla Releases Security Updates for Multiple Products Mozilla has released security updates to address vulnerabilities for Firefox 117, Firefox ESR...
CISA and FBI Publish Joint Advisory on QakBot Infrastructure Today, the Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on August 29, 2023. This...
VMware Releases Security Updates for Aria Operations for Networks VMware has released security updates to address multiple vulnerabilities in Aria...
CISA Warns of Hurricane-Related Scams CISA urges users to remain on alert for malicious cyber activity following natural disasters, such...
VMware Releases Security Update for Tools VMware has released a security update to address a vulnerability in VMware Tools. A...
CISA and International Partners Release Malware Analysis Report on Infamous Chisel Mobile Malware Today, the United Kingdom’s National Cyber Security...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on September 5, 2023. These...
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on August 31, 2023. These...
Banking and logistics industries are under the onslaught of a reworked variant of a malware called Chaes. "It has undergone...
In today's digital age, it's not just about being online but how securely your organization operates online. Regardless of size...
The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday said it thwarted a cyber attack against an unnamed critical...
Nine security flaws have been disclosed in electric power management products made by Schweitzer Engineering Laboratories (SEL). "The most severe...
A previously undocumented "phishing empire" has been linked to cyber attacks aimed at compromising Microsoft 365 business email accounts over...
An updated version of a malware loader known as BLISTER is being used as part of SocGholish infection chains to...
The role of the CISO keeps taking center stage as a business enabler: CISOs need to navigate the complex landscape...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________GPAC interger overflowPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC could allow a remote attacker to execute arbitrary...
NAME__________Waiting: One-click countdowns Plugin for cross-site request forgery,Platforms Affected:WordPress One-click countdowns Plugin for WordPress 0.6.2Risk Level:6.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Waiting: One-click countdowns...
NAME__________GPAC stack-based buffer overflowPlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:5.9Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________GPAC is vulnerable to a stack-based buffer overflow, caused...
NAME__________General Solutions Steiner GmbH CASE 3 Taskmanagement cross-site scriptingPlatforms Affected:General Solutions Steiner GmbH CASE 3 Taskmanagement 3.3Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________General...
NAME__________GPAC denial of servicePlatforms Affected:GPAC GPAC 2.3-DEV-revreleaseRisk Level:3.3Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________GPAC is vulnerable to a denial of service,...