Cobalt Strike Beacon Detected – 112[.]74[.]184[.]37:53
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Ransomware Group: INTERLOCK VICTIM NAME: RJM Marketing NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: KAIROS VICTIM NAME: T&M Equipment NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Vulnerability Summary: CVE-2024-51541 Local File Inclusion vulnerabilities allow access to sensitive system information. Affected products: ABB ASPECT - Enterprise v3.08.02;...
Vulnerability Summary: CVE-2024-51543 Information Disclosure vulnerabilities allow access to application configuration information. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS...
Vulnerability Summary: CVE-2024-51542 Configuration Download vulnerabilities allow access to dependency configuration information. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS...
Vulnerability Summary: CVE-2024-51555 Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system...
Vulnerability Summary: CVE-2024-48847 MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or...
Vulnerability Summary: CVE-2024-51554 Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials....
Vulnerability Summary: CVE-2024-51551 Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials....
Vulnerability Summary: CVE-2024-51548 Dangerous File Upload vulnerabilities allow upload of malicious scripts. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS...
Vulnerability Summary: CVE-2024-51550 Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in...
Vulnerability Summary: CVE-2024-51549 Absolute File Traversal vulnerabilities allows access and modification of un-intended resources. Affected products: ABB ASPECT - Enterprise...
Ransomware Group: EVEREST VICTIM NAME: Medical Technology Industries, Inc NOTE: No files or stolen information are by RedPacket Security. Any...
Company Name: Mozilla Company HackerOne URL: https://hackerone.com/mozilla Submitted By:haveanicedayLink to Submitters Profile:https://hackerone.com/haveaniceday Report Title:mozillanet ] A subdomain takeover is available...
Ransomware Group: MEDUSA VICTIM NAME: Brodsky Renehan Pearlstein & Bouquet, Chartered NOTE: No files or stolen information are by RedPacket...
Ransomware Group: MEDUSA VICTIM NAME: Levicoff Law Firm, PC NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: DRAGONFORCE VICTIM NAME: Precision Walls NOTE: No files or stolen information are by RedPacket Security. Any legal issues...