Author: Tekno Phreak
-
Cobalt Strike Beacon Detected – 121[.]43[.]110[.]28:81
* [Cobalt Strike](https://www.redpacketsecurity.com/category/cobalt-strike/)Cobalt Strike Beacon Detected — 121-[.-]43-[.-]110-[.-]28:81=============================================================[December 6, 2024](https://www.redpacketsecurity.com/2024/12/) Cobalt Strike Beacon Detection Alerts > The Information provided at…
-
Cobalt Strike Beacon Detected – 110[.]40[.]141[.]38:80
* [Cobalt Strike](https://www.redpacketsecurity.com/category/cobalt-strike/)Cobalt Strike Beacon Detected — 110-[.-]40-[.-]141-[.-]38:80=============================================================[December 6, 2024](https://www.redpacketsecurity.com/2024/12/) Cobalt Strike Beacon Detection Alerts > The Information provided at…
-
Cobalt Strike Beacon Detected – 154[.]9[.]232[.]166:666
* [Cobalt Strike](https://www.redpacketsecurity.com/category/cobalt-strike/)Cobalt Strike Beacon Detected — 154-[.-]9-[.-]232-[.-]166:666==============================================================[December 6, 2024](https://www.redpacketsecurity.com/2024/12/) Cobalt Strike Beacon Detection Alerts > The Information provided at…
-
Exploits and vulnerabilities in Q3 2024
![](https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/12/06081001/SL-vulnerability-exploit-report-q3-2024-featured-990×400.jpg)Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that are not standard for cyberattacks. This is because…
-
Conquering the Complexities of Modern BCDR
![Modern BCDR](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZbsm8MIsDOwphqZmMCfwh_VYkjL7qRqzHW2eLgWJ2CcNeuSW4XJAArx4_eL1Myd-PaOJz86sKot3VcUueFJiJy8gP5wxVconW1KYC7XtqP9T8iFm-Ces-pGlz5MiSBeJDKfTCzQJAOswTB3K_CTsB3bxlSldY78ZzBrSTrtCpLH5TnMDWP7LRcehxMUk/s728-rw-e365/rel.png ‘Modern BCDR’)The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities…
-
Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia1UI8-w6ihOHAxW_rag0lwL_ksW9lIyTZn6Ib3LsOCmUQJUIDoZkgR4URLpY2-TT9KtRE5Dyg3DLj7cGx3wwQKKoYAxNi5NT1Rxs9QgKY8bMJYUH3sC1LwIlH2C64nS8j0-uyH5bWWnvXej9ZtokT81257ZXnCW7Fp1smuSCbwR_EkCGudkACK64PZn2L/s728-rw-e365/ai-model.png)Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch,…
-
FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine
![Russian Programmer](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqJ75gjpg8k9dVxTKKsF6qYQzR4IDldFkYCQzUErYTicEA7XHnTiIAFYj-7LQpvnVVRlHUAFwPqOxoe6W4x2dm5h2yRkKNaoNbqu3_Ciei3VitMgxBHQzeNTdBou62tijV1CJmipKBnBiQfIgmEi3J4h3HL9D2grw1IuTTIjyIJrV1t8u0nZ3JuSVZEO8M/s728-rw-e365/programmer.png ‘Russian Programmer’)A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware…
-
Compromised ultralytics PyPI package delivers crypto coinminer
![XMRig-Coinminer](https://www.reversinglabs.com/hs-fs/hubfs/Blog/XMRig-Coinminer.webp?width=1400&height=732&name=XMRig-Coinminer.webp)Executive Summary——————————————————————————————————————————————————–On December 4, a malicious version 8.3.41 of the popular AI library *ultralytics* — which has almost 60 million…
-
U.S. Organization in China Targeted by Attackers
A large U.S. entity with significant operations in China faced a four-month-long cyber intrusion, likely conducted by a China-based threat…
-
HHS OCR Imposes a $548,265 Penalty Against Children’s Hospital Colorado for HIPAA Violations
Not all monetary penalties are for breaches affecting large numbers of patients. In this case, HHS imposed a penalty on…