Half of IT Leaders Identify IoT as Security Weak Point
Half of all IT leaders believe that the Internet of Things (IoT) is the weakest part of their security efforts,...
Half of all IT leaders believe that the Internet of Things (IoT) is the weakest part of their security efforts,...
HIBP In February 2024, the Australian Telco Tangerine suffered a data breach that exposed over 200k customer records. Attributed to...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on February 20, 2024. These...
CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems Today, CISA, the Environmental Protection Agency (EPA), and...
CISA Adds One Known Exploited ConnectWise Vulnerability, CVE-2024-1709, to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities...
Mozilla Releases Security Updates for Firefox and Thunderbird Mozilla released security updates to address vulnerabilities in Firefox, Firefox ESR, and...
CISA Releases Seventeen Industrial Control Systems Advisories CISA released seventeen Industrial Control Systems (ICS) advisories on February 15, 2024. These...
Updated: Top Cyber Actions for Securing Water Systems Today, CISA, the Environmental Protection Agency (EPA), and the Federal Bureau of...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on February 22, 2024. These...
CISA, FBI, and HHS Release an Update to #StopRansomware Advisory on ALPHV Blackcat Today, CISA, the Federal Bureau of Investigation...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 27, 2024. These...
CISA, NCSC-UK, and Partners Release Advisory on Russian SVR Actors Targeting Cloud Infrastructure CISA, in partnership with UK National Cyber...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
BlackCat / ALPHV Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 27, 2024. These...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________EventStoreDB information disclosurePlatforms Affected:Event Store EventStoreDB 23.10.0 Event Store EventStoreDB 22.10.4 Event Store EventStoreDB 21.10.10 Event Store EventStoreDB 20.10.5 Event...
NAME__________LIVEBOX Collaboration vDesk open redirectPlatforms Affected:LIVEBOX Collaboration vDesk 031Risk Level:5.7Exploitability:UnprovenConsequences:Other DESCRIPTION__________LIVEBOX Collaboration vDesk could allow a remote authenticated attacker to...
NAME__________LIVEBOX Collaboration vDesk information disclosurePlatforms Affected:LIVEBOX Collaboration vDesk 031Risk Level:5.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________LIVEBOX Collaboration vDesk could allow a remote attacker to...
NAME__________Querybook cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Querybook is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A...
NAME__________LIVEBOX Collaboration vDesk cross-site scriptingPlatforms Affected:LIVEBOX Collaboration vDesk 031Risk Level:5.7Exploitability:UnprovenConsequences:Cross-Site Scripting DESCRIPTION__________LIVEBOX Collaboration vDesk is vulnerable to cross-site scripting, caused...
NAME__________backstage directory traversalPlatforms Affected:Risk Level:6.5Exploitability:HighConsequences:Obtain Information DESCRIPTION__________backstage could allow a remote attacker to traverse directories on the system, caused by...