CVE Alert: CVE-2024-39525
Vulnerability Summary: CVE-2024-39525 An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos...
Vulnerability Summary: CVE-2024-39525 An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos...
Vulnerability Summary: CVE-2024-39516 An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos...
Vulnerability Summary: CVE-2024-38817 Mware NSX contains a command injection vulnerability. A malicious actor with access to the NSX Edge CLI...
Vulnerability Summary: CVE-2024-7037 In version v0.3.8 of open-webui/open-webui, the endpoint /api/pipelines/upload is vulnerable to arbitrary file write and delete due...
Vulnerability Summary: CVE-2024-38818 VMware NSX contains a local privilege escalation vulnerability. An authenticated malicious actor may exploit this vulnerability to...
Vulnerability Summary: CVE-2024-7041 An Insecure Direct Object Reference (IDOR) vulnerability exists in open-webui/open-webui version v0.3.8. The vulnerability occurs in the...
Vulnerability Summary: CVE-2024-8264 Fortra's Robot Schedule Enterprise Agent prior to version 3.05 writes FTP username and password information to the...
Ransomware Group: FLOCKER VICTIM NAME: K***N Corp NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
In October's Patch Tuesday update, Microsoft has effectively mitigated two zero-day vulnerabilities under active exploitation and three publicly reported issues,...
Social media users across the EU will soon benefit from a streamlined way to address grievances regarding content moderation on...
Ivanti recently warned its Cloud Services Appliance (CSA) customers to update their systems immediately due to three critical zero-day vulnerabilities...
BeaverTail malware is a new threat targeting job seekers, specifically those in the tech industry, by exploiting fake recruiters. A...
Australia's new standalone cybersecurity law addresses the growing need for enhanced protection against cyber threats, ensuring the safety of citizens...
The UK government is encouraging young individuals to explore cybersecurity careers through a new competition aimed at honing their skills....
The new iPhone mirroring feature presents significant employee privacy risks, as identified in Apple's recent software updates. This flaw affects...
A new generation of malicious QR codes has surfaced, highlighting significant security concerns around phishing attacks known as quishing. Recent...
HIBP In September 2024, the digital library of internet sites Internet Archive suffered a data breach that exposed 31M records....
Ransomware Group: PLAY VICTIM NAME: Universal Companies NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: PLAY VICTIM NAME: RobbJack & Crystallume NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: PLAY VICTIM NAME: FortyEighty Architecture NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...