CISA: CISA Releases Best Practice Guidance for Mobile Communications
CISA Releases Best Practice Guidance for Mobile Communications Today, CISA released Mobile Communications Best Practice Guidance. The guidance was crafted...
CISA Releases Best Practice Guidance for Mobile Communications Today, CISA released Mobile Communications Best Practice Guidance. The guidance was crafted...
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on December 17, 2024. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on January 7, 2025. These...
Fortinet Releases Security Updates for FortiManager Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
The Information provided at the time of posting was detected as "Covenant C2". Depending on when you are viewing this...
Ransomware Group: LYNX VICTIM NAME: jimthompsoncom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FUNKSEC VICTIM NAME: ndcegcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: astaphanscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FOG VICTIM NAME: Saint-Bar (saintbarbe) NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Vulnerability Summary: CVE-2024-43064 Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global...
Vulnerability Summary: CVE-2024-45541 Memory corruption when IOCTL call is invoked from user-space to read board data. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-45546 Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-45559 Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. Affected Endpoints:...
Vulnerability Summary: CVE-2024-45542 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Affected...
Vulnerability Summary: CVE-2024-12970 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM...
Vulnerability Summary: CVE-2024-45553 Memory corruption can occur when process-specific maps are added to the global list. If a map is...
Vulnerability Summary: CVE-2024-45558 Transient DOS can occur when the driver parses the per STA profile IE and tries to access...
Vulnerability Summary: CVE-2024-45550 Memory corruption occurs when invoking any IOCTL-calling application that executes all MCDM driver IOCTL calls. Affected Endpoints:...
Vulnerability Summary: CVE-2024-45555 Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows...
Ransomware Group: MORPHEUS VICTIM NAME: Pus Gmbh NOTE: No files or stolen information are by RedPacket Security. Any legal issues...