Douglas-042 – Powershell Script To Help Speed Up Threat Hunting Incident Response Processes
DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the...
DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in Windows...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But why does it...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...