Medusa Locker Ransomware Victim: Jockey Club
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
BreachForums - Databreach discussion & leaks forum. NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________JumpServer information disclosurePlatforms Affected:JumpServer JumpServer 3.7.2Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________JumpServer could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Man Group D-Tale cross-site scriptingPlatforms Affected:Man Group D-Tale 3.6.0Risk Level:6.1Exploitability:HighConsequences:Gain Access DESCRIPTION__________Man Group D-Tale is vulnerable to cross-site scripting, caused...
NAME__________Stellar rs-stellar-strkey denial of servicePlatforms Affected:Stellar rs-stellar-strkey 0.0.7Risk Level:5.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Stellar rs-stellar-strkey is vulnerable to a denial of service,...
NAME__________Linux Kernel denial of servicePlatforms Affected:Linux Kernel 6.5.9Risk Level:5.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Linux Kernel is vulnerable to a denial of service,...
NAME__________CryptoES information disclosurePlatforms Affected:CryptoES CryptoES 2.0.4Risk Level:7.4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________CryptoES could allow a remote attacker to obtain sensitive information, caused by...
NAME__________D-Link DAR-7000 SQL injectionPlatforms Affected:D-Link DAR-7000 V31R02B1413CRisk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________D-Link DAR-7000 is vulnerable to SQL injection. A remote attacker could...
NAME__________Twisted security bypassPlatforms Affected:Twisted Twisted 23.8.0Risk Level:5.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Twisted could allow a remote attacker to bypass security restrictions, caused by...