CovenantC2 Detected – 173[.]199[.]70[.]18:7443
The Information provided at the time of posting was detected as "Covenant C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Covenant C2". Depending on when you are viewing this...
Ransomware Group: FOG VICTIM NAME: Saint-Bar (saintbarbe) NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: LYNX VICTIM NAME: astaphanscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FUNKSEC VICTIM NAME: ndcegcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: jimthompsoncom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2024-45546 Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-45541 Memory corruption when IOCTL call is invoked from user-space to read board data. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-43064 Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global...
Vulnerability Summary: CVE-2024-45542 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Affected...
Vulnerability Summary: CVE-2024-45559 Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. Affected Endpoints:...
Vulnerability Summary: CVE-2024-45558 Transient DOS can occur when the driver parses the per STA profile IE and tries to access...
Vulnerability Summary: CVE-2024-45553 Memory corruption can occur when process-specific maps are added to the global list. If a map is...
Vulnerability Summary: CVE-2024-12970 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM...
Vulnerability Summary: CVE-2024-45555 Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows...
Vulnerability Summary: CVE-2024-45550 Memory corruption occurs when invoking any IOCTL-calling application that executes all MCDM driver IOCTL calls. Affected Endpoints:...
Ransomware Group: MORPHEUS VICTIM NAME: Pus Gmbh NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MORPHEUS VICTIM NAME: Arrotex Pharmaceuticals NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Company Name: Mozilla Company HackerOne URL: https://hackerone.com/mozilla Submitted By:dotxmlLink to Submitters Profile:https://hackerone.com/dotxml Report Title:Bypass Email Verification on Add Email MonitoringReport...
Ransomware Group: AKIRA VICTIM NAME: AAA Environmental NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: AKIRA VICTIM NAME: Drywall Partitions NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: AKIRA VICTIM NAME: Drivestream NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2024-31913 IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored...
Vulnerability Summary: CVE-2024-5594 OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary...
Vulnerability Summary: CVE-2024-8474 OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in...