BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks
The BlackCat/ALPHV ransomware operation has begun to use a new tool named 'Munchkin' that utilizes virtual machines to deploy encryptors...
The BlackCat/ALPHV ransomware operation has begun to use a new tool named 'Munchkin' that utilizes virtual machines to deploy encryptors...
More than 40,000 Cisco devices running the IOS XE operating system have been compromised after hackers exploited a recently disclosed...
Sandu Diaconu, the operator of the E-Root marketplace, has been extradited to the U.S. to face a maximum imprisonment penalty...
Microsoft is extending Purview Audit log retention as promised after the Chinese Storm-0558 hacking group breached dozens of Exchange and...
A Google Ads campaign was found pushing a fake KeePass download site that used Punycode to appear as the official...
Play News Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info3ds -- teamwork_cloud_no_magic_releaseA Cross-Site Request Forgery (CSRF) vulnerability affecting Teamwork Cloud from...
Company Name: b'Nextcloud' Company HackerOne URL: https://hackerone.com/nextcloud Submitted By:b'bhmth'Link to Submitters Profile:https://hackerone.com/b'bhmth' Report Title:b'Responsive Server-side Request Forgery (SSRF)'Report Link:https://hackerone.com/reports/1895874Date Submitted:19...
Company Name: b'LinkedIn' Company HackerOne URL: https://hackerone.com/linkedin Submitted By:b'domg'Link to Submitters Profile:https://hackerone.com/b'domg' Report Title:b'Deny Admin from Editing LinkedIn Company Page...
Threat actors are known for impersonating popular brands in order to trick users. In a recent malvertising campaign, we observed a...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Zephyr buffer overflowPlatforms Affected:Zephyr Project Zephyr 3.4.0Risk Level:7.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Zephyr is vulnerable to a stack-based buffer overflow, caused by improper...
NAME__________XnSoft NConvert for Windows denial of servicePlatforms Affected:XnSoft NConvert for Windows 7.154 XnSoft NConvert for Windows 7.153Risk Level:7.8Exploitability:UnprovenConsequences:Denial of Service...
NAME__________Who Hit The Page Hit Counter plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Mediabay plugin for WordPress 1.6 WordPress Mediabay...
NAME__________QNAP QTS, QuTS hero, and QuTScloud directory traversalPlatforms Affected:QNAP QuTS hero h5.1.0 QNAP QTS 5.1.0 QNAP QuTScloud c5.0Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information...
NAME__________WebAuthn4J Spring Security security bypassPlatforms Affected:WebAuthn4J Spring Security 0.9.0.RELEASERisk Level:4.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________WebAuthn4J Spring Security could allow a remote attacker to...
NAME__________ZPE Systems Nodegrid OS information disclosurePlatforms Affected:ZPE Systems Nodegrid OS 5.8.10 ZPE Systems Nodegrid OS 5.8.13 ZPE Systems Nodegrid OS...
NAME__________QNAP QTS, QuTS hero, and QuTScloud buffer overflowPlatforms Affected:QNAP QTS 4.5.0 QNAP QTS 5.0.0 QNAP QuTS Hero h5.0.0 QNAP QuTS...
NAME__________QNAP QTS, QuTS hero, and QuTScloud denial of servicePlatforms Affected:QNAP QTS 4.5.0 QNAP QTS 5.0.0 QNAP QuTS Hero h5.0.0 QNAP...
NAME__________XnSoft NConvert for Windows denial of servicePlatforms Affected:XnSoft NConvert for Windows 7.154 XnSoft NConvert for Windows 7.153Risk Level:7.8Exploitability:UnprovenConsequences:Denial of Service...