Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two...
As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two...
The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data...
GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take over accounts...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Atomic Stealer, also known as AMOS, is a popular stealer for Mac OS. Back in September, we described how malicious...
During the past month, we have observed an increase in the number of malicious ads on Google searches for “Zoom”,...
ScamClub is a threat actor who’s been involved in malvertising activities since 2018. Chances are you probably ran into one...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have...
During this past year, we have seen an increase in the use of malicious ads (malvertising) and specifically those via...
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users....
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong...
NAME__________Trend Micro Apex Central local file includePlatforms Affected:Trend Micro Apex Central 2019Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Trend Micro Apex Central could allow...
NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OS 22.3 Juniper Networks Junos OS 22.4 Juniper Networks Junos...
NAME__________Juniper Networks Junos OS and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS 21.3 Juniper Networks Junos OS...
NAME__________Trend Micro Apex Central cross-site scriptingPlatforms Affected:Trend Micro Apex Central 2019Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Trend Micro Apex Central is vulnerable to...
NAME__________Juniper Networks Junos OS denial of servicePlatforms Affected:Juniper Networks Junos OS 21.3 Juniper Networks Junos OS 21.4 Juniper Networks Junos...
NAME__________Trend Micro Apex Central cross-site scriptingPlatforms Affected:Trend Micro Apex Central 2019Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Trend Micro Apex Central is vulnerable to...
NAME__________Juniper Networks Junos OS and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS 22.2 Juniper Networks Junos OS...
NAME__________fontTools XML external entity injectionPlatforms Affected:fontTools fontTools 4.28.2 fontTools fontTools 4.42.1Risk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________fontTools is vulnerable to an XML external...
NAME__________Juniper Networks Junos OS and and Junos OS Evolved denial of servicePlatforms Affected:Juniper Networks Junos OS 21.2 Juniper Networks Junos...