[AKIRA] – Ransomware Victim: Lawrie Insurance Group
Ransomware Group: AKIRA VICTIM NAME: Lawrie Insurance Group NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: AKIRA VICTIM NAME: Lawrie Insurance Group NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: AKIRA VICTIM NAME: Concord Management Services NOTE: No files or stolen information are by RedPacket Security. Any legal...
Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led...
Company Name: FetLife Company HackerOne URL: https://hackerone.com/fetlife Submitted By:ezzraLink to Submitters Profile:https://hackerone.com/ezzra Report Title:Able to see location coordinates in any...
Company Name: Internet Bug Bounty Company HackerOne URL: https://hackerone.com/ibb Submitted By:ooooooo_qLink to Submitters Profile:https://hackerone.com/ooooooo_q Report Title:Possible DoS Vulnerability with Range...
Company Name: Internet Bug Bounty Company HackerOne URL: https://hackerone.com/ibb Submitted By:ooooooo_qLink to Submitters Profile:https://hackerone.com/ooooooo_q Report Title:Possible XSS Vulnerability in Action...
Ransomware Group: AKIRA VICTIM NAME: ATG Communications Group NOTE: No files or stolen information are by RedPacket Security. Any legal...
Threat Actors Continue to Exploit OT/ICS through Unsophisticated Means CISA continues to respond to active exploitation of internet-accessible operational technology...
Citrix Releases Security Updates for XenServer and Citrix Hypervisor Citrix released security updates to address multiple vulnerabilities in XenServer and...
Ransomware Group: QILIN VICTIM NAME: Luso Cuanzа NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: CLOAK VICTIM NAME: Pennvetcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you...
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto...
Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority...
SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits. A web application firewall...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Ransomware Group: LYNX VICTIM NAME: triveruscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of...
A now-patched security vulnerability in OpenAI's ChatGPT app for macOS could have made it possible for attackers to plant long-term...
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing...
Vulnerability Summary: CVE-2024-38268 An improper restriction of operations within the bounds of a memory buffer in the MAC address parser...
Vulnerability Summary: CVE-2024-38267 An improper restriction of operations within the bounds of a memory buffer in the IPv6 address parser...
Vulnerability Summary: CVE-2024-38266 An improper restriction of operations within the bounds of a memory buffer in the parameter type parser...