[RHYSIDA] – Ransomware Victim: Henry County Schools
Ransomware Group: RHYSIDA VICTIM NAME: Henry County Schools NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: RHYSIDA VICTIM NAME: Henry County Schools NOTE: No files or stolen information are by RedPacket Security. Any legal...
Guidance: Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM) Today, CISA published the Framing Software Component Transparency, created...
Vulnerability Summary: CVE-2024-9922 The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing unauthenticated remote attackers...
Vulnerability Summary: CVE-2024-49214 QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT...
Vulnerability Summary: CVE-2024-9921 The Team+ from TEAMPLUS TECHNOLOGY does not properly validate specific page parameter, allowing unauthenticated remote attackers to...
Vulnerability Summary: CVE-2024-9924 The fix for CVE-2024-26261 was incomplete, and and the specific package for OAKlouds from Hgiga remains at...
Vulnerability Summary: CVE-2024-9139 The affected product permits OS command injection through improperly restricted commands, potentially allowing attackers to execute arbitrary...
Vulnerability Summary: CVE-2024-9923 The Team+ from TEAMPLUS TECHNOLOGY does not properly validate a specific page parameter, allowing remote attackers with...
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote...
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a...
Company Name: Enjin Company HackerOne URL: https://hackerone.com/enjin Submitted By:ndizon_Link to Submitters Profile:https://hackerone.com/ndizon_ Report Title:Host header injection leads to account takeoverReport...
Company Name: Enjin Company HackerOne URL: https://hackerone.com/enjin Submitted By:mo_salah12Link to Submitters Profile:https://hackerone.com/mo_salah12 Report Title:Race Condition on Create API FunctionReport Link:https://hackerone.com/reports/2682392Date...
Ransomware Group: ABYSS VICTIM NAME: In the depths of software development Unlocking the secrets of Promise Technology, Inc NOTE: No...
Ransomware Group: RANSOMHUB VICTIM NAME: basarsoftcomtr NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FOG VICTIM NAME: Central Pennsylvania Food Bank NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: ABYSS VICTIM NAME: In the depths of software development NOTE: No files or stolen information are by RedPacket...
Ransomware Group: MEDUSA VICTIM NAME: Inner City Education Foundation NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: MEDUSA VICTIM NAME: Ultimate Removal NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MEDUSA VICTIM NAME: SystemPavers NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: HUNTERS VICTIM NAME: Parnell Defense NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MEDUSA VICTIM NAME: Ideker NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: RHYSIDA VICTIM NAME: Microworks NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SARCOMA VICTIM NAME: McMunn & Yates Building Suppliesorp NOTE: No files or stolen information are by RedPacket Security....
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal...