Medusa Locker Ransomware Victim: Somagic
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that,...
A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit called r77, marking...
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and...
Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through a...
A recently uncovered phishing campaign is targeting Microsoft 365 accounts of key executives in U.S.-based organizations by abusing open redirects from...
Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in...
A new Linux vulnerability known as 'Looney Tunables' enables local attackers to gain root privileges by exploiting a buffer overflow...
A set of critical vulnerabilities dubbed 'ShellTorch' in the open-source TorchServe AI model-serving tool impact tens of thousands of internet-exposed...
Google has released the October 2023 security updates for Android, addressing 54 unique vulnerabilities, including two known to be actively...
Google will introduce new sender guidelines in February to bolster email security against phishing and malware delivery by mandating bulk...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
The Chartered Institute of Information Security (CIISec) has said it hopes to enrol at least 400 students on its CyberEPQ...
Security experts have warned of surging cyber risk in open source ecosystems, having detected three times more malicious packages in...
Over half (52%) of cybersecurity professionals are experiencing an increase in cyber-attacks compared to a year ago, according to new...
Nearly one in five (19%) adults polled in a new survey from the UK’s privacy regulator think they’ve been monitored...
The National Security Agency (NSA) has unveiled the AI Security Center, a new entity dedicated to overseeing the development and...
A series of malicious packages hidden within the Node Package Manager (npm), the largest software registry for JavaScript, has been...
The Madagascar government likely used the Cytrox-developed Predator spyware to conduct political domestic surveillance ahead of the country’s presidential election,...
The EU’s Cyber Resilience Act (CRA) could be misused by governments for intelligence or surveillance purposes, a group of industry...
HIBP In December 2022, attackers socially engineered an Activision HR employee into disclosing information which led to the breach of...
LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a financially motivated attacker that leverages...
A financially motivated campaign has been targeting online payment businesses in the Asia Pacific, North America, and Latin America with...
Arm has released security patches to contain a security flaw in the Mali GPU Kernel Driver that has come under...