
Blog
-
[LOCKBIT3] – Ransomware Victim: kumhotire[.]com
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LOCKBIT3-] — Ransomware Victim: kumhotire-[.-]com====================================================[September 26, 2024](https://www.redpacketsecurity.com/2024/09/) Ransomware Group: **LOCKBIT3**==============================### VICTIM…
-
[LOCKBIT3] – Ransomware Victim: chcm[.]us
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LOCKBIT3-] — Ransomware Victim: chcm-[.-]us==============================================[September 26, 2024](https://www.redpacketsecurity.com/2024/09/) Ransomware Group: **LOCKBIT3**==============================### VICTIM…
-
[CLOAK] – Ransomware Victim: Ful************[.]com
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[CLOAK-] — Ransomware Victim: Ful-*-*-*-*-*-*-*-*-*-*-*-*-[.-]com===================================================================[September 26, 2024](https://www.redpacketsecurity.com/2024/09/) Ransomware Group: **CLOAK**===========================### VICTIM…
-
Progress Software fixed 2 new critical flaws in WhatsUp Gold
Progress Software addresses six new security vulnerabilities affecting its WhatsUp Gold, two of them are rated as critical severity.————————————————————————————————————————————Progress Software…
-
Can CISOs Meet Expectations?
As we head toward 2025, are the duties and goals of a chief information security officer achievable? Are CISOs set…
-
Analyzing the Mekotio Trojan
The analysis delves into the Mekotio Trojan, a sophisticated malware that employs a PowerShell dropper to execute its payload. The…
-
Analyzing the Mekotio Trojan
The analysis delves into the Mekotio Trojan, a sophisticated malware that employs a PowerShell dropper to execute its payload. The…
-
Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool
Cybercriminals are employing a sophisticated two-stage malware campaign masquerading as the Palo Alto GlobalProtect tool to infiltrate systems in the…
-
Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool
Cybercriminals are employing a sophisticated two-stage malware campaign masquerading as the Palo Alto GlobalProtect tool to infiltrate systems in the…
-
Analyzing the Newest Turla Backdoor
The Russian APT group Turla has launched a new campaign using shortcut files to infect systems with a fileless backdoor.…