Blog


  • [FUNKSEC] – Ransomware Victim: new cloud storage for our leaks

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[FUNKSEC-] — Ransomware Victim: new cloud storage for our leaks=================================================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[FUNKSEC] – Ransomware Victim:…


  • [LYNX] – Ransomware Victim: Astaphans

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LYNX-] — Ransomware Victim: Astaphans========================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[LYNX] – Ransomware Victim: Astaphans 1’)Ransomware Group: **LYNX**==========================### VICTIM…


  • [LYNX] – Ransomware Victim: Jim Thompson

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LYNX-] — Ransomware Victim: Jim Thompson===========================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[LYNX] – Ransomware Victim: Jim Thompson 1’)Ransomware Group:…


  • IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI

    IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to [cross-site scripting (XSS)](https://cybersecuritynews.com/xss-remains-as-the-most-vulnerability/) attacks. The vulnerability, identified…


  • DoJ charged three Russian citizens with operating crypto-mixing services

    The U.S. Department of Justice charged three Russian citizens with operating crypto-mixing services that helped crooks launder cryptocurrency.———————————————————————————————————————————————-The U.S. Department…


  • Information Stealer Masquerades as LDAPNightmare (CVE202449113) PoC Exploit

    A fake proof-of-concept exploit for the LDAPNightmare vulnerability (CVE-2024-49113) is being used to distribute information-stealing malware. The malicious repository, disguised…


  • Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware

    A resurgence of activity related to the Black Basta ransomware campaign has been observed since early October. The threat actors…


  • Recruitment Phishing Scam Imitates Hiring Process

    A sophisticated phishing campaign has been discovered that exploits recruitment branding to deliver malware. The attack begins with a phishing…


  • Increase in Distribution of AutoIt Compile Malware via Phishing Emails

    The distribution of malware compiled with AutoIt has been rapidly increasing, surpassing .NET-type malware. AutoIt, a scripting language for Windows…


  • Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection

    A sophisticated credit card skimmer malware has been discovered targeting WordPress websites. The malware injects malicious JavaScript into database entries,…