Author: Tekno Phreak


  • 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

    #### [CSO](/security/cso/)**5** 1000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole==================================================================================**5** PAN-PAN! Intruders inject web shell backdoors,…


  • Andrew Tate’s site ransacked, subscriber data stolen

    #### [Cyber-crime](/security/cyber_crime/)**32** Andrew Tate’s site ransacked, subscriber data stolen====================================================**32** He’ll just have to take this one on the chin——————————————–[Iain Thomson](/Author/Iain-Thomson…


  • [RANSOMHUB] – Ransomware Victim: blr[.]com

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[RANSOMHUB-] — Ransomware Victim: blr-[.-]com===============================================[November 22, 2024](https://www.redpacketsecurity.com/2024/11/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[RANSOMHUB] – Ransomware Victim: blr[.]com 1’)Ransomware Group: **RANSOMHUB**===============================### VICTIM…


  • [BIANLIAN] – Ransomware Victim: Trinity Petroleum Management, LLC

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[BIANLIAN-] — Ransomware Victim: Trinity Petroleum Management, LLC====================================================================[November 23, 2024](https://www.redpacketsecurity.com/2024/11/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[BIANLIAN] – Ransomware Victim: Trinity Petroleum…


  • ZoomIn: A Closer Look into the Malware Artifacts, Behaviors and Network Communications

    FrostyGoop, an operational technology (OT) malware, disrupted critical infrastructure in Ukraine in early 2024, affecting heating systems for over 600…


  • Life on a crooked RedLine: Analyzing the infamous infostealers backend

    This article provides an in-depth analysis of RedLine Stealer, a notorious information-stealing malware. The research focuses on previously undocumented backend…


  • Fake AI video generators infect Windows, macOS with infostealers

    Threat actors are using fake AI image and video generators to distribute Lumma Stealer and AMOS information-stealing malware on Windows…


  • Security plugin flaw in millions of WordPress sites gives admin access

    ![WordPress](https://www.bleepstatic.com/content/hl-images/2023/12/07/back.jpg)A critical authentication bypass vulnerability has been discovered impacting the WordPress plugin ‘Really Simple Security’ (formerly ‘Really Simple SSL’), including…


  • Phishing emails increasingly use SVG attachments to evade detection

    ![Phishing](https://www.bleepstatic.com/content/hl-images/2021/04/16/malware-phishing-header.jpg)Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection.Most images…


  • Will passkeys ever replace passwords? Can they?

    #### [Security](/security/)**2** Will passkeys ever replace passwords? Can they?===============================================**2** Here’s why they really should—————————–[Bruce Davie](/Author/Bruce-Davie ‘Read more by this author’)…