Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems
Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple...
Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple...
A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook, and OneDrive earlier this month to an...
While the use of Infrastructure as Code (IaC) has gained significant popularity as organizations embrace cloud computing and DevOps practices,...
As Threat Actors Continuously Adapt their TTPs in Today's Threat Landscape, So Must You Earlier this year, threat researchers at...
Governmental entities in the Middle East and Africa have been at the receiving end of sustained cyber-espionage attacks that leverage...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME__________SiliconLabs EFR32 Bluetooth LE stack denial of servicePlatforms Affected:Silicon Labs EFR32 Bluetooth LE stack 5.1.0 Silicon Labs EFR32 Bluetooth LE...
NAME__________Admin side data storage for Contact Form 7 Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress WP Abstracts Plugin for WordPress 2.6.2Risk...
NAME__________Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients privilege escalationPlatforms Affected:Zoom Zoom for Windows clients 5.13.2 Zoom Zoom...
NAME__________Silicon Labs Gecko SDK information disclosurePlatforms Affected:Silicon Labs Gecko SDK 4.2.3Risk Level:3.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Silicon Labs Gecko SDK could allow a...
NAME__________Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) cross-site scriptingPlatforms Affected:Proofpoint Threat Response 5.10.0Risk Level:4.3Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Proofpoint Threat Response /...
NAME__________Google XML Sitemap for Videos plugin for WordPress cross-site request forgeryPlatforms Affected:WordPress Google XML Sitemap Plugin for WordPress 2.6.1Risk Level:4.3Exploitability:UnprovenConsequences:Gain...
NAME__________Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) information disclosurePlatforms Affected:Proofpoint Threat Response 5.10.0 Proofpoint Threat Response Auto-Pull 5.10.0Risk Level:5.3Exploitability:UnprovenConsequences:Obtain...