[LYNX] – Ransomware Victim: plowmancraven[.]co[.]uk
Ransomware Group: LYNX VICTIM NAME: plowmancravencouk NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: plowmancravencouk NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
Ransomware Group: INTERLOCK VICTIM NAME: Winnebago Public School Foundation NOTE: No files or stolen information are by RedPacket Security. Any...
Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more...
Defending your organization's security is like fortifying a castle—you need to understand where attackers will strike and how they'll try...
An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys...
The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the...
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads...
Vulnerability Summary: CVE-2024-20531 A vulnerability in the API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary...
Vulnerability Summary: CVE-2024-20538 A vulnerability in the web-based management interface of Cisco ISE could allow an unauthenticated, remote attacker to...
Vulnerability Summary: CVE-2024-20540 A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could...
Vulnerability Summary: CVE-2024-20537 A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to...
Vulnerability Summary: CVE-2024-20539 A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to...