TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a...
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a...
Company Name: Enjin Company HackerOne URL: https://hackerone.com/enjin Submitted By:ndizon_Link to Submitters Profile:https://hackerone.com/ndizon_ Report Title:Host header injection leads to account takeoverReport...
Company Name: Enjin Company HackerOne URL: https://hackerone.com/enjin Submitted By:mo_salah12Link to Submitters Profile:https://hackerone.com/mo_salah12 Report Title:Race Condition on Create API FunctionReport Link:https://hackerone.com/reports/2682392Date...
Ransomware Group: ABYSS VICTIM NAME: In the depths of software development Unlocking the secrets of Promise Technology, Inc NOTE: No...
Ransomware Group: RANSOMHUB VICTIM NAME: basarsoftcomtr NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FOG VICTIM NAME: Central Pennsylvania Food Bank NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: ABYSS VICTIM NAME: In the depths of software development NOTE: No files or stolen information are by RedPacket...
Ransomware Group: MEDUSA VICTIM NAME: Inner City Education Foundation NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: MEDUSA VICTIM NAME: Ultimate Removal NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MEDUSA VICTIM NAME: SystemPavers NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: HUNTERS VICTIM NAME: Parnell Defense NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: MEDUSA VICTIM NAME: Ideker NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: RHYSIDA VICTIM NAME: Microworks NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: SARCOMA VICTIM NAME: McMunn & Yates Building Suppliesorp NOTE: No files or stolen information are by RedPacket Security....
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal...
Vulnerability Summary: CVE-2024-7847 VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following...
Vulnerability Summary: CVE-2024-9137 The affected product lacks an authentication check when sending commands to the server via the Moxa service....
Vulnerability Summary: CVE-2024-9823 There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause...
Vulnerability Summary: CVE-2024-6762 Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s...
Vulnerability Summary: CVE-2024-8184 There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause...
Vulnerability Summary: CVE-2024-45733 In Splunk Enterprise for Windows versions below 9.2.3 and 9.1.6, a low-privileged user that does not hold...
Vulnerability Summary: CVE-2024-45731 In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not...
Vulnerability Summary: CVE-2024-6763 Eclipse Jetty is a lightweight, highly scalable, Java-based web server and Servlet engine . It includes a...
Vulnerability Summary: CVE-2024-45734 In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin"...