OK
https://packetstormsecurity.com/
Websites
Runtime: 2.6s
On January 18, 2025, 07:32 AM UTC, https://packetstormsecurity.com/ was accessible when tested on AS6400 in Dominican Republic.
Failures
HTTP Experiment
null
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.217.36.88
Query:
IN A packetstormsecurity.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
198.84.60.203
TCP Connections
Connection to 198.84.60.203:443 succeeded.
HTTP Requests
URL
GET https://packetstorm.news/
Response Headers
Cache-Control:max-age=0, private, must-revalidateContent-Length:67073Content-Security-Policy:default-src 'self'; script-src 'self' https://js.stripe.com 'unsafe-inline'; frame-src 'self' https://js.stripe.com 'unsafe-inline'; style-src 'self' 'unsafe-inline'Content-Type:text/html; charset=utf-8Date:Sat, 18 Jan 2025 07:33:14 GMTEtag:W/"28277f79a21a42bd2ea9e12e4ff5003a"Link:</css/20250103-application.css>; rel=preload; as=style; nopush,</js/20241226-master.js>; rel=preload; as=script; nopushPragma:no-cacheReferrer-Policy:strict-origin-when-cross-originServer:nginxSet-Cookie:_b_session=V20qG36eoBjOspj9wS5dwfPY0nqYSy07Sbhsq5ajZp9B2XGuY0UOre8uqpvRDr5bWXJNkwcjEN1G2AqsHjL3xJLiijEF2ZkzMqsRaUd1Lmwse4%2FVf6tq6h371y33o%2FLksCrOVTR%2Fd4B0%2Bk9lu9B%2BBL5gbQYoSayYS%2BzV%2BUVbKRVAPLmSs1CkiIV6cxGjgUhVrg2EusGDLLGgl1JdqwQwBJPjzWLZ%2FA92xtxGKk6wMmT%2BQnRVLv0%2FbeITQEbrg6QcoYtVZLAaJvbYvnM%2B5afUqGgp--BuxaR58zYMDx9tWI--0cjpmfZNOprydjZm9wp9rg%3D%3D; path=/; Secure; HttpOnly;; HttpOnly; SameSite=LaxStrict-Transport-Security:max-age=2592000; includeSubDomainsVary:Accept-EncodingX-Content-Type-Options:nosniffX-Download-Options:noopenX-Frame-Options:SAMEORIGINX-Permitted-Cross-Domain-Policies:noneX-Request-Id:99186b97-fac2-400e-8ecd-c682b6217456X-Runtime:0.104440X-Xss-Protection:1; mode=block
Response Body
<!DOCTYPE html> <html> <head> <link rel="icon" href="/icons/favicon.ico" type="image/x-icon"> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <meta charset="UTF-8"> <meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers" /> <meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability,rce" /> <title>Packet Storm</title> <link rel="stylesheet" href="/css/20250103-application.css" /> <script src="/js/20241226-master.js"></script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="7le-NItT-pwku520fJH9lW_Dlrn7lM5P3GvRcYUPGpG25FGLB4NgnMG_aaDzOjnJ5OJNSCEVjU8hACwrARZVUg" /> <meta name="csp-nonce" /> </head> <body> <div class="brows overlay-header"> <div class="topbarsize"> <div class="row"> <div style="margin-top:15px;margin-left:75px;"> <a href="/"><img style="height:40px;z-index:10000;" src="/logos/smalllogobeta.png"></a> <br/> </div> <div id="search" style="margin-top:20px;margin-left:400px"><form id="noenter" method="get" action="/search/"><input style="vertical-align:top;" type="text" name="q" id="q" size=28 height="30px" maxlength="150" placeholder="SEARCH …" onKeyUp="checkSearchInput(document.getElementById('q').value);" onclick="showTabs(this)" value=""/><span id="nosubmit" class="rfsmall upperme"> <button style="vertical-align:top;" type="submit"></button></span><div id="tabwrapper" class="tabwrapper" style="display:none;"><ul><li><input type="radio" id="tab1" name="a" value="files" checked="checked"><label for="tab1">files</label></li><li><input type="radio" id="tab2" value="news" name="a"><label for="tab2">news</label></li><li><input type="radio" id="tab3" value="users" name="a"><label for="tab3">users</label></li><li><input type="radio" id="tab10" value="cve" name="a"><label for="tab10">cve</label></li></ul></div></form></div> </div> </div> </div> <div class="mobil overlay-headermob"> <div class="topbarsize"> <div class="row"> <div class="col-md-12 col-lg-12" style="margin-top:15px;margin-left:75px;"> <a href="/"><img style="height:40px;z-index:10000;" src="/logos/smalllogobeta.png"></a> <p style="margin-left:5px;margin-top:-5px;"/><nobr> </nobr> <br> </div> <div id="search" style="margin-top:80px;margin-left:80px"><form id="noenter" method="get" action="/search/"><input style="vertical-align:top;" type="text" name="q" id="mq" size=24 height="30px" maxlength="150" placeholder="SEARCH …" onKeyUp="mcheckSearchInput(document.getElementById('mq').value);" onclick="mshowTabs(this)" value=""/><span id="mnosubmit" class="rfsmall upperme"> <button style="vertical-align:top;" type="submit"></button></span><div id="mtabwrapper" class="tabwrapper" style="display:none;"><ul><li><input type="radio" id="tab5" name="a" value="files" checked="checked"><label for="tab5">files</label></li><li><input type="radio" id="tab6" value="news" name="a"><label for="tab6">news</label></li><li><input type="radio" id="tab7" value="users" name="a"><label for="tab7">users</label></li><li><input type="radio" id="tab9" value="cve" name="a"><label for="tab9">cve</label></li></ul></div></form></div> </div> </div> </div> <div class="topmenu"> <a href="javascript:toggleMenu(this);"><div style="width:10px;"></div><div id="graphic" style="top:0px;width:50px;"><img src="/logos/linegray.png" /></div></a></div> <div id="menushow" style="display:none;"> <div class="brows"> <div style="width:100%;" class="menunew rfmedium headspot" ><div style="width:100%;background: linear-gradient(180deg, black, white);" class="rfmenu headme border border-top-0 border-left-0 border-secondary"> <br/> <div class="card"><div class="card-header retro text-white cardheadbg" style="font-size:16px;">Command and Control</div><div class="card-body rfsmall flex" style="width:100%;margin:0;padding:10px;"> <table border="0" style="margin-top:-20px;"> <tr><td style="vertical-align:top;padding:5px;width:200px;"> <br> <p class="rfsmall whiten" style="background: linear-gradient(270deg, black, #000066);text-indent:5px;">System</p><a class="rfsmall" href="/help/view/4"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-submissions.png"> About</a><br><br><a class="rfsmall" href="/files/latest/1"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-files.png"> Files</a><br><br><a class="rfsmall" href="/news/main/page/1"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-news.png"> News</a><br><br><a class="rfsmall" href="/polls/page/1"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-vote.png"> Vote</a><br><br><a class="rfsmall" href="/help/"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-help.png"> Help</a><br><br></td><td style="width:200px;vertical-align:top;padding:5px;"><br><p class="rfsmall whiten" style="background: linear-gradient(270deg, black, #000066);text-indent:5px;">Services</p><a class="rfsmall" href="/help/view/1"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-api.png"> API</a><br><br><a class="rfsmall" href="/help/view/24"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-advertise.png"> Advertise</a><br><br><a class="rfsmall" href="/help/view/11"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-contact.png"> Contact</a><br><br></td><td style="width:200px;vertical-align:top;padding:5px;"><br><p class="rfsmall whiten" style="background: linear-gradient(270deg, black, #000066);text-indent:5px;"> Account</p><a class="rfsmall" href="/account/signup/"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-signup.png"> Join</a><br><br><a class="rfsmall" href="/account/login/"><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:30px;" src="/icons/icon-login.png"> Login</a><br><br></td></tr></table></div></div><br/></div></div> </div><div class="mobil"> <div class="menunewmob rfmedium headspot"><div class="rfmenu headmemob" style="margin-top:-30px;z-index:1;background-color:white;" ><br/> <table border="0" cellpadding="10" style="table-layout: fixed;width:100vw;margin-top:-20px;"> <tr style="background: linear-gradient(180deg, black, #000066);height:10px;" class="text-white"><td colspan="4" class="rfmedium" style="padding-top:0px;padding-bottom:0px;"><b>System</b></td></tr><tr style="padding-left: 0px;"> <td width="25%"><a class="rfmediummenu" href="/help/view/4/"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-submissions.png"><br>About</center></a></td> <td width="25%"><a class="rfmediummenu" href="/files/latest/1"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-files.png"><br>Files</center></a></td> <td width="25%"><a class="rfmediummenu" href="/news/main/page/1"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-news.png"><br>News</center></a></td> <td width="25%"><a class="rfmediummenu" href="/polls/page/1"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-vote.png"><br>Vote</center></a></td> </tr><tr> <td width="25%"><a class="rfmediummenu" href="/help/"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-help.png"><br>Help</center></a></td> </tr> <tr style="background: linear-gradient(180deg, black, #000066);height:10px;" class="text-white"><td colspan="4" class="rfmedium" style="padding-top:0px;padding-bottom:0px;"><b>Services</b></td></tr><tr> <td width="25%"><a class="rfmediummenu" href="/help/view/1"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-api.png"><br>API</center></a></td> <td width="25%"><a class="rfmediummenu" href="/help/view/24"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-advertise.png"><br>Advertise</center></a></td> <td width="25%"><a class="rfmediummenu" href="/help/view/11"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-contact.png"><br>Contact</center></a></td> </tr> <tr style="background: linear-gradient(180deg, black, #000066);height:10px;" class="text-white"><td colspan="4" class="rfmedium" style="padding-top:0px;padding-bottom:0px;"><b>Account</b></td></tr><tr><td width="25%"><a class="rfmediummenu" href="/account/signup"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-signup.png"><br>Join</center></a></td><td><a class="rfmediummenu" href="/account/login"><center><img style="border-collapse:separate;border:solid black 1px;border-radius:10px;height:15vw;" src="/icons/icon-login.png"><br>Login</center></a></td></tr></table></div></div> </div> </div> <section><br class="responsive"/> <br/> <div style="height:300px;width:102%;margin-top:300px;background: linear-gradient(180deg, black, white);"></div><div class="fpmc" style="margin-top:50px;margin-top:-550px;"> <style> .btext { font-size: .7em; color: white; width: 100%; border-collapse: collapse; } .btext td, .btext tr { padding: 0; margin: 0; vertical-align: top; } .btext a { color: white; text-decoration: none; } .fronttxt{ padding:5px;line-height:1.0em;opacity:0.8;position:absolute;display:block;width:250px;z-index:50; margin-left:5px; float:left; font-size: .8em; } #scroller { display: flex; overflow: hidden; position: relative; width: auto; overflow-x: scroll; height: auto; scrollbar-width: thin; scrollbar-color: #666 #888; } /* .image-container { position: relative; width: 350px; height: 350px; transition: transform 0.5s ease-out; } */ .image-container { position: relative; width: 350px; height: 350px; transition: transform 0.5s ease-out; scrollbar-width: thin; scrollbar-color: #888 #036; :hover { scrollbar-color: #036 #000; } } #scroller img { width: 100%; height: 100%; display: flex; } .text-overlay { margin-left:30px; position: relative; color: white; background-color: #000000; bottom: 120px; width: 60%; word-wrap: break-word; } /* Customize the scrollbar track (background of the scroll bar) */ [scrubbed]-webkit-scrollbar { width: 8px; /* width of the scrollbar */ height: 1px; /* height of the scrollbar (if horizontal scrollbar) */ background: lightblue; } /* Customize the scrollbar handle (the part you drag) */ [scrubbed]-webkit-scrollbar-thumb { background-color: #888; /* color of the scrollbar handle */ border-radius: 5px; /* roundness of the scrollbar handle */ } /* Customize the scrollbar when hovered */ [scrubbed]-webkit-scrollbar-thumb:hover { background-color: lightblue; /* darker color when hovered */ } /* Customize the scrollbar track (optional) */ [scrubbed]-webkit-scrollbar-track { background: lightblue; /* darker color when hovered */ /* background: #f1f1f1; color of the scrollbar track */ border-radius: 10px; /* roundness of the track */ } </style> <div class="row" style="margin-left:0px;width:105vw;"><div style="margin-top:5px;width:100vw;" id="scroller"> <a href="https://www.securityweek.com/microsoft-patches-trio-of-exploited-windows-hyper-v-zero-days/"> <div class="image-container"> <img src="/uimg/pic/image/large-09f4ad4a09cb52cab6d4ff2b596c7da4a6d90bd9ad711613e7050206d16eaca0.png" alt="Image 1"> <span class="fronttxt text-overlay">Microsoft Patches Trio of Exploited Windows Hyper-V Zero Days <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.securityweek.com/"> Security Week</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/35/1'>Flaw</a>, <a href='/news/tags/6/1'>Microsoft</a>, <a href='/news/tags/50/1'>Patch</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/80/1'>0 Day</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/4-2-million-internet-hosts-hijacked-via-bugs-in-tunneling-protocols"> <div class="image-container"> <img src="/uimg/pic/image/large-cfe0cbd4f3756f1059288558252999bdd5feabf153f4326a3022b0383ab7e370.png" alt="Image 1"> <span class="fronttxt text-overlay">4.2 Million Hosts Hijacked Via Bugs in Tunneling Protocols <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/28/1'>Denial of Service</a>, <a href='/news/tags/23/1'>DNS</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/35/1'>Flaw</a></td></tr></table> </span></div></a> <a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/"> <div class="image-container"> <img src="/uimg/pic/image/large-aa3c3cbbfe724c8373352ede5d8109bc38ca5499225e497856cb74c9d0bd1b8e.png" alt="Image 1"> <span class="fronttxt text-overlay">Microsoft Eggheads Say AI Can Never Be Made Secure after Testing Their Own Products <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.theregister.com/"> The Register</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/31/1'>Botnet</a>, <a href='/news/tags/6/1'>Microsoft</a>, <a href='/news/tags/112/1'>Science</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/106/1'>Terror</a></td></tr></table> </span></div></a> <a href="https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/"> <div class="image-container"> <img src="/uimg/pic/image/large-013ae1a784ae84109b4064d9ee7a171652cb751722bc63ae16c52e9bffe81494.png" alt="Image 1"> <span class="fronttxt text-overlay">Medusa Ransomware Group Claims Attack on UK's Gateshead Council <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.theregister.com/"> The Register</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/122/1'>Cryptography</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/2/1'>Hacker</a>, <a href='/news/tags/5/1'>Malware</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/16/1'>Britain</a></td></tr></table> </span></div></a> <a href="https://www.bleepingcomputer.com/news/security/w3-total-cache-plugin-flaw-exposes-1-million-wordpress-sites-to-attacks/"> <div class="image-container"> <img src="/uimg/pic/image/large-b9ef280499e7789451532f3fcf6421d966ccf47857981261abb8581da5a6b183.png" alt="Image 1"> <span class="fronttxt text-overlay">W3 Total Cache Plugin Exposes 1 Million WordPress Sites to Attack <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.bleepingcomputer.com/"> Bleeping Computer</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/97/1'>WordPress</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/35/1'>Flaw</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/ransomhub-infection-facilitated-by-possible-ai-assisted-python-backdoor"> <div class="image-container"> <img src="/uimg/pic/image/large-7871dd4f0b9fc45906dc1f71bcfa5db260e2d952c14a06bc82a5c9e9fe58441b.png" alt="Image 1"> <span class="fronttxt text-overlay">RansomHub Infection Facilitated by Possible AI-Assisted Python Backdoor <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/108/1'>Backdoor</a>, <a href='/news/tags/122/1'>Cryptography</a>, <a href='/news/tags/5/1'>Malware</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/2/1'>Hacker</a></td></tr></table> </span></div></a> <a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/"> <div class="image-container"> <img src="/uimg/pic/image/large-caccae10be4fb41d4a5122abc1420d9593e972086abc682438f7fdd8e5efc871.png" alt="Image 1"> <span class="fronttxt text-overlay">US Announces Sanctions against North Korean Fake IT Worker Network <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.securityweek.com/"> Security Week</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/36/1'>Cyberwar</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/219/1'>North Korea</a>, <a href='/news/tags/71/1'>Phish</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/32/1'>Fraud</a></td></tr></table> </span></div></a> <a href="https://www.reuters.com/legal/us-supreme-court-upholds-law-banning-tiktok-2025-01-17/"> <div class="image-container"> <img src="/uimg/pic/image/large-f5fdd329d4da12f5113066598ab4c3d0a3d3190a0e3cd7eb7b09f38d48868bfd.png" alt="Image 1"> <span class="fronttxt text-overlay">US Supreme Court Upholds Law Banning TikTok <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.reuters.com/"> Reuters</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/24/1'>China</a>, <a href='/news/tags/36/1'>Cyberwar</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/87/1'>Social</a>, <a href='/news/tags/56/1'>Spyware</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/30/1'>Data Loss</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/four-take-guilty-pleas-in-us-government-it-bribery-scam"> <div class="image-container"> <img src="/uimg/pic/image/large-be9c9914281f4ec748691dcc3a1b212941779a5006547e475eb3806344d24722.png" alt="Image 1"> <span class="fronttxt text-overlay">Four Take Guilty Pleas in US Government IT Bribery Scam <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/16</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/32/1'>Fraud</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/north-koreas-it-worker-scam-linked-to-2016-crowdfunding-operation"> <div class="image-container"> <img src="/uimg/pic/image/large-e88171ac0ce67be70e8ffd9d6bb7134a8e53e156b324514cc7e40783797329d5.png" alt="Image 1"> <span class="fronttxt text-overlay">North Korea's IT Worker Scam Linked to 2016 Crowdfunding Operation <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/16</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/26/1'>Cybercrime</a>, <a href='/news/tags/32/1'>Fraud</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/68/1'>Identity Theft</a>, <a href='/news/tags/219/1'>North Korea</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/87/1'>Social</a></td></tr></table> </span></div></a> <a href="https://www.securityweek.com/microsoft-patches-trio-of-exploited-windows-hyper-v-zero-days/"> <div class="image-container"> <img src="/uimg/pic/image/large-09f4ad4a09cb52cab6d4ff2b596c7da4a6d90bd9ad711613e7050206d16eaca0.png" alt="Image 1"> <span class="fronttxt text-overlay">Microsoft Patches Trio of Exploited Windows Hyper-V Zero Days <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.securityweek.com/"> Security Week</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/35/1'>Flaw</a>, <a href='/news/tags/6/1'>Microsoft</a>, <a href='/news/tags/50/1'>Patch</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/80/1'>0 Day</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/4-2-million-internet-hosts-hijacked-via-bugs-in-tunneling-protocols"> <div class="image-container"> <img src="/uimg/pic/image/large-cfe0cbd4f3756f1059288558252999bdd5feabf153f4326a3022b0383ab7e370.png" alt="Image 1"> <span class="fronttxt text-overlay">4.2 Million Hosts Hijacked Via Bugs in Tunneling Protocols <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/28/1'>Denial of Service</a>, <a href='/news/tags/23/1'>DNS</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/35/1'>Flaw</a></td></tr></table> </span></div></a> <a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/"> <div class="image-container"> <img src="/uimg/pic/image/large-aa3c3cbbfe724c8373352ede5d8109bc38ca5499225e497856cb74c9d0bd1b8e.png" alt="Image 1"> <span class="fronttxt text-overlay">Microsoft Eggheads Say AI Can Never Be Made Secure after Testing Their Own Products <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.theregister.com/"> The Register</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/31/1'>Botnet</a>, <a href='/news/tags/6/1'>Microsoft</a>, <a href='/news/tags/112/1'>Science</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/106/1'>Terror</a></td></tr></table> </span></div></a> <a href="https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/"> <div class="image-container"> <img src="/uimg/pic/image/large-013ae1a784ae84109b4064d9ee7a171652cb751722bc63ae16c52e9bffe81494.png" alt="Image 1"> <span class="fronttxt text-overlay">Medusa Ransomware Group Claims Attack on UK's Gateshead Council <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.theregister.com/"> The Register</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/122/1'>Cryptography</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/2/1'>Hacker</a>, <a href='/news/tags/5/1'>Malware</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/16/1'>Britain</a></td></tr></table> </span></div></a> <a href="https://www.bleepingcomputer.com/news/security/w3-total-cache-plugin-flaw-exposes-1-million-wordpress-sites-to-attacks/"> <div class="image-container"> <img src="/uimg/pic/image/large-b9ef280499e7789451532f3fcf6421d966ccf47857981261abb8581da5a6b183.png" alt="Image 1"> <span class="fronttxt text-overlay">W3 Total Cache Plugin Exposes 1 Million WordPress Sites to Attack <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.bleepingcomputer.com/"> Bleeping Computer</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/97/1'>WordPress</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/35/1'>Flaw</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/ransomhub-infection-facilitated-by-possible-ai-assisted-python-backdoor"> <div class="image-container"> <img src="/uimg/pic/image/large-7871dd4f0b9fc45906dc1f71bcfa5db260e2d952c14a06bc82a5c9e9fe58441b.png" alt="Image 1"> <span class="fronttxt text-overlay">RansomHub Infection Facilitated by Possible AI-Assisted Python Backdoor <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/108/1'>Backdoor</a>, <a href='/news/tags/122/1'>Cryptography</a>, <a href='/news/tags/5/1'>Malware</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/2/1'>Hacker</a></td></tr></table> </span></div></a> <a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/"> <div class="image-container"> <img src="/uimg/pic/image/large-caccae10be4fb41d4a5122abc1420d9593e972086abc682438f7fdd8e5efc871.png" alt="Image 1"> <span class="fronttxt text-overlay">US Announces Sanctions against North Korean Fake IT Worker Network <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.securityweek.com/"> Security Week</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/36/1'>Cyberwar</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/219/1'>North Korea</a>, <a href='/news/tags/71/1'>Phish</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/32/1'>Fraud</a></td></tr></table> </span></div></a> <a href="https://www.reuters.com/legal/us-supreme-court-upholds-law-banning-tiktok-2025-01-17/"> <div class="image-container"> <img src="/uimg/pic/image/large-f5fdd329d4da12f5113066598ab4c3d0a3d3190a0e3cd7eb7b09f38d48868bfd.png" alt="Image 1"> <span class="fronttxt text-overlay">US Supreme Court Upholds Law Banning TikTok <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/17</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.reuters.com/"> Reuters</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/24/1'>China</a>, <a href='/news/tags/36/1'>Cyberwar</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/87/1'>Social</a>, <a href='/news/tags/56/1'>Spyware</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/30/1'>Data Loss</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/four-take-guilty-pleas-in-us-government-it-bribery-scam"> <div class="image-container"> <img src="/uimg/pic/image/large-be9c9914281f4ec748691dcc3a1b212941779a5006547e475eb3806344d24722.png" alt="Image 1"> <span class="fronttxt text-overlay">Four Take Guilty Pleas in US Government IT Bribery Scam <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/16</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/12/1'>USA</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/32/1'>Fraud</a></td></tr></table> </span></div></a> <a href="https://www.scworld.com/news/north-koreas-it-worker-scam-linked-to-2016-crowdfunding-operation"> <div class="image-container"> <img src="/uimg/pic/image/large-e88171ac0ce67be70e8ffd9d6bb7134a8e53e156b324514cc7e40783797329d5.png" alt="Image 1"> <span class="fronttxt text-overlay">North Korea's IT Worker Scam Linked to 2016 Crowdfunding Operation <br><br><table class="btext" style="width:100%;"><tr style="padding-left:10px;"><td style="width: 1px;">Posted:</td><td align="left"> 2025/01/16</td></tr><tr style="padding-left:10px;"><td style="width: 1px;">Source:</td><td align="left"><a href="https://www.scworld.com/"> SC Magazine</a></td></tr><tr style="padding-left:10px;"><td style="width: 1px;vertical-align:top;">Tag(s):</td><td align="left"> <a href='/news/tags/26/1'>Cybercrime</a>, <a href='/news/tags/32/1'>Fraud</a>, <a href='/news/tags/3/1'>Government</a>, <a href='/news/tags/68/1'>Identity Theft</a>, <a href='/news/tags/219/1'>North Korea</a>, <a href='/news/tags/1/1'>Headline</a>, <a href='/news/tags/87/1'>Social</a></td></tr></table> </span></div></a></div> <script> function sleep(ms) { return new Promise(resolve => setTimeout(resolve, ms)); } window.addEventListener('load', function() { const scroller = document.getElementById('scroller'); let direction = 1; // 1 for left, -1 for right const speed = 1; // Keep the speed at 1, we'll slow down using delay const imageContainers = document.querySelectorAll('.image-container'); // Ensure all images are loaded before starting let imagesLoaded = 0; imageContainers.forEach(container => { const img = container.querySelector('img'); if (img.complete) { imagesLoaded++; } else { img.addEventListener('load', () => { imagesLoaded++; if (imagesLoaded === imageContainers.length) { sleep(4000); } }); } }); // Start scrolling immediately if all images are already loaded if (imagesLoaded === imageContainers.length) { startScroll(); } function updateScale() { const centerX = window.innerWidth / 2; const scrollers = document.querySelectorAll('.image-container'); scrollers.forEach(el => { const rect = el.getBoundingClientRect(); const distanceFromCenter = Math.abs(centerX - (rect.left + rect.width / 2)); // Scale factor adjustment: scale is between 1 (100%) and 1.2 (120%) const scale = 1 + 0.2 * (1 - distanceFromCenter / centerX); el.style.transform = `scale(${Math.max(scale, 1)})`; // Minimum scale is 100% }); } async function startScroll() { const maxScrollLeft = scroller.scrollWidth - scroller.clientWidth; async function scroll() { scroller.scrollLeft += direction * speed; // Adjust scrolling increment // Reverse direction at boundaries if (scroller.scrollLeft >= maxScrollLeft && direction > 0 || scroller.scrollLeft <= 0 && direction < 0) { direction *= -1; // Toggle the direction } updateScale(); // Update scale based on position // Add a small delay to slow down the animation (half speed) await sleep(16); // 16ms delay (~60fps), increasing this slows down the scroll requestAnimationFrame(scroll); } scroll(); // Start the animation loop } window.addEventListener('resize', updateScale); // Ensure scale updates on window resize }); </script> </div> <div class="fponlymc brows row"><hr class="shr"/><p/><div class="col-md-6 col-lg-6"><span class="retro">Storm Watch (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br><table class="col-md-12 col-lg-12 rfmedium" style="height:375px;width:100%;background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;padding:5px;"><tr><td style="vertical-align:top;">2025-01-17: <a href="/news/main/page/1">8 news articles added</a><br>2025-01-17: <a href="/files/main/page/1">23 files added</a><br>2024-12-12: <a href="/polls/page/1">1 voting poll added</a><br><hr/>2025-01-12 (1736640000)<br><br>Added over 5,000 CISA documents in case DOGE decides to cancel them. Will track them going forward as they come out.<br>...<br><a href="/changelog/">[ View Full Changelog ]</a><br></td></tr></table></div><br class="responsive"><br class="responsive"><div class="col-md-6 col-lg-6"> <span class="retro">Grab Gear (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br> <a href="https://packet-storm-security.printify.me/products"> <table class="col-md-12 col-lg-12 rfmedium" style="height:375px;width:100%;background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;padding-top:5px;padding-bottom:5px;"> <tr> <td> <center> <div> <div class="brows"> <img style="height:125px;" src="/img/store/ps-hat.png" alt="Hat"> <img style="height:125px;" src="/img/store/ps-hoodie.png" alt="Hoodie"> <img style="height:125px;" src="/img/store/ps-mousepad.png" alt="Mousepad"> </div> <div class="mobil"> <img style="height:100px;" src="/img/store/ps-hat.png" alt="Hat"> <img style="height:100px;" src="/img/store/ps-hoodie.png" alt="Hoodie"> <img style="height:100px;" src="/img/store/ps-mousepad.png" alt="Mousepad"> </div> <br> <div class="brows"> <img style="height:125px;" src="/img/store/ps-mug.png" alt="Mug"> <img style="height:125px;" src="/img/store/ps-shirt.png" alt="Shirts"> <img style="height:125px;" src="/img/store/ps-phonecase.png" alt="Phonecase"> </div><div class="mobil"> <img style="height:100px;" src="/img/store/ps-mug.png" alt="Mug"> <img style="height:100px;" src="/img/store/ps-shirt.png" alt="Shirts"> <img style="height:100px;" src="/img/store/ps-phonecase.png" alt="Phonecase"> </div> </div> </center> </td> </tr> <tr> <td style="padding-left:50px;padding-right:50px;"> <b style="text-align:left;">Support Packet Storm by grabbing gear! Our online store is now open and ready to take your money!</b></center> </td> </tr> </table> </a> </div></div><tr><td> <div class="fponlymc brows row"><p/><hr class="shr"/><p/><div class="col-md-6 col-lg-6"><span class="retro">Polls (<a href="/polls/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><table class="col-md-12 col-lg-12" style="padding:10px;width:100%; background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;" cellspacing="2"><tr style="background-color:#F5F5F5;" class="rfmedium"><td colspan="2">With large networks having become vastly unmanageable, hackers can easily find outdated software to attack and then persist inside of networks. Many attack vectors do not end up in logs, so SOCs will not catch them. <p/><br><b>At any given point in the past month, how many tech giant and government networks do you think are currently breached?</b></td></tr><tr><td class="rfsmall" width="50%"><b>Answers</b></td><td class="rfsmall" width="50%"><b>Results</b></td></tr><tr><td style="padding:10px;" class="rfsmall">0% — They hire only the best and are usually impenetrable.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">10% — I'm sure some hackers get in but are quickly caught.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">20% — I want to believe 20% is the worst it can be.<td style="text-align:right;background: linear-gradient(to right, lightblue 75%, white 50%);">75%</td></tr><tr><td style="padding:10px;" class="rfsmall">50% — I've worked some of these places and it's a toss up.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">80% — It's a constant battle we are losing to ignorance and incompetence.<td style="text-align:right;background: linear-gradient(to right, lightblue 25%, white 50%);">25%</td></tr><tr><td style="padding:10px;" class="rfsmall">100% — Every company or agency I've worked at has been compromised for some time.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr></table></div><div class="col-md-6 col-lg-6"><span class="retro">Visit a Sponsor (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br><div class="card" style="background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;height:88%;"> <div class="card-body rfsmall" style="display:inline;"> <div class="brows"> <table border="0" style="width: 100%;"><tr><td style="text-align: center;"><a href="https://packetstorm.news/help/view/24"><img style="height: 280px; width: 280px;" src="/uimg/adpic/large-966c9532cce86dfe25ad945aebd757e63d9fca9881575d75624b82c3e70ab695.png"></a></td><td style="padding-left: 20px; text-align:left; width:80%;" class="rflarge retro"><span style="font-size:22px;font-weight: bold;"><a href="https://packetstorm.news/help/view/24">Get your new product or service noticed on Packet Storm today!</a></span></td></tr><tr><td colspan="2" style="text-align: left; padding-top: 20px;font-size:16px;"><br><a href="https://packetstorm.news/help/view/24">Packet Storm now offers advertising. There's no better way to reach the security community. Try it out!</a></td></tr></table> </div><div class="mobil"> <table border="0" style="width: 100%;"><tr><td style="text-align: center;"><a href="https://packetstorm.news/help/view/24"><img style="height: 280px; width: 280px;" src="/uimg/adpic/large-966c9532cce86dfe25ad945aebd757e63d9fca9881575d75624b82c3e70ab695.png"></a></td></tr><tr><td style="text-align:left; width:80%;" class="rflarge retro"><br><span style="font-size:22px;font-weight: bold;"><a href="https://packetstorm.news/help/view/24">Get your new product or service noticed on Packet Storm today!</a></span></td></tr><tr><td colspan="2" style="text-align: left; padding-top: 20px;font-size:16px;"><a href="https://packetstorm.news/help/view/24">Packet Storm now offers advertising. There's no better way to reach the security community. Try it out!</a></td></tr></table> </div> </div></div><p/></div></div></td></tr><tr><td> <div class="fponlymc brows row"><p/><hr class="shr"/><p/><div class="col-md-6 col-lg-6"><span class="retro">Files (<a href="/files/main/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188741/">Gentoo Linux Security Advisory 202501-03</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188740/">Gentoo Linux Security Advisory 202501-02</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188739/">Debian Security Advisory 5843-2</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188738/">CISA: Closing The Software Understanding Gap</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188737/">iPhone Visual Voicemail IMAP NAMESPACE Use-After-Free</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188736/">Emsisoft Anti-Malware Net-NTLMv2 Hash Information Disclosure</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188735/">Ubuntu Security Notice USN-7216-1</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188734/">Ubuntu Security Notice USN-7206-2</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188733/">Red Hat Security Advisory 2025-0390-03</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188732/">Ubuntu Security Notice USN-7209-1</a><br/>Posted: 2025-01-17</div></div><br/></div><div class="col-md-6 col-lg-6"><span class="retro">News (<a href="/news/main/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.securityweek.com/microsoft-patches-trio-of-exploited-windows-hyper-v-zero-days/">Microsoft Patches Trio of Exploited Windows Hyper-V Zero Days</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/4-2-million-internet-hosts-hijacked-via-bugs-in-tunneling-protocols">4.2 Million Hosts Hijacked Via Bugs in Tunneling Protocols</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/">Microsoft Eggheads Say AI Can Never Be Made Secure after Testing Their Own Products</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/">Medusa Ransomware Group Claims Attack on UK's Gateshead Council</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.bleepingcomputer.com/news/security/w3-total-cache-plugin-flaw-exposes-1-million-wordpress-sites-to-attacks/">W3 Total Cache Plugin Exposes 1 Million WordPress Sites to Attack</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/ransomhub-infection-facilitated-by-possible-ai-assisted-python-backdoor">RansomHub Infection Facilitated by Possible AI-Assisted Python Backdoor</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/">US Announces Sanctions against North Korean Fake IT Worker Network</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.reuters.com/legal/us-supreme-court-upholds-law-banning-tiktok-2025-01-17/">US Supreme Court Upholds Law Banning TikTok</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/four-take-guilty-pleas-in-us-government-it-bribery-scam">Four Take Guilty Pleas in US Government IT Bribery Scam</a><br/>Posted: 2025-01-16</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/north-koreas-it-worker-scam-linked-to-2016-crowdfunding-operation">North Korea's IT Worker Scam Linked to 2016 Crowdfunding Operation</a><br/>Posted: 2025-01-16</div></div><br/></div></div></td></tr></table> <div class="fponlymc mobil row"><div class="col-md-12 col-lg-12"><span class="retro">Storm Watch (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br><table class="col-md-12 col-lg-12 rfmedium" style="height:375px;width:100%;background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;padding:5px;"><tr><td style="vertical-align:top;">2025-01-17: <a href="/news/main/page/1">8 news articles added</a><br>2025-01-17: <a href="/files/main/page/1">23 files added</a><br>2024-12-12: <a href="/polls/page/1">1 voting poll added</a><br><hr/>2025-01-12 (1736640000)<br><br>Added over 5,000 CISA documents in case DOGE decides to cancel them. Will track them going forward as they come out.<br>...<br><a href="/changelog/">[ View Full Changelog ]</a><br></td></tr></table></div></div><div class="mobil row"><div class="col-md-12 col-lg-12"> <span class="retro">Grab Gear (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br> <a href="https://packet-storm-security.printify.me/products"> <table class="col-md-12 col-lg-12 rfmedium" style="height:375px;width:100%;background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;padding-top:5px;padding-bottom:5px;"> <tr> <td> <center> <div> <div class="brows"> <img style="height:125px;" src="/img/store/ps-hat.png" alt="Hat"> <img style="height:125px;" src="/img/store/ps-hoodie.png" alt="Hoodie"> <img style="height:125px;" src="/img/store/ps-mousepad.png" alt="Mousepad"> </div> <div class="mobil"> <img style="height:100px;" src="/img/store/ps-hat.png" alt="Hat"> <img style="height:100px;" src="/img/store/ps-hoodie.png" alt="Hoodie"> <img style="height:100px;" src="/img/store/ps-mousepad.png" alt="Mousepad"> </div> <br> <div class="brows"> <img style="height:125px;" src="/img/store/ps-mug.png" alt="Mug"> <img style="height:125px;" src="/img/store/ps-shirt.png" alt="Shirts"> <img style="height:125px;" src="/img/store/ps-phonecase.png" alt="Phonecase"> </div><div class="mobil"> <img style="height:100px;" src="/img/store/ps-mug.png" alt="Mug"> <img style="height:100px;" src="/img/store/ps-shirt.png" alt="Shirts"> <img style="height:100px;" src="/img/store/ps-phonecase.png" alt="Phonecase"> </div> </div> </center> </td> </tr> <tr> <td style="padding-left:50px;padding-right:50px;"> <b style="text-align:left;">Support Packet Storm by grabbing gear! Our online store is now open and ready to take your money!</b></center> </td> </tr> </table> </a> </div></div> <div class="fponlymc mobil row"><div class="col-md-12 col-lg-12"><span class="retro">Polls (<a href="/polls/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><table class="col-md-12 col-lg-12" style="padding:10px;width:100%; background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;-webkit-border-radius: 5px;border-collapse: separate;" cellspacing="2"><tr style="background-color:#F5F5F5;" class="rfmedium"><td colspan="2">With large networks having become vastly unmanageable, hackers can easily find outdated software to attack and then persist inside of networks. Many attack vectors do not end up in logs, so SOCs will not catch them. <p/><br><b>At any given point in the past month, how many tech giant and government networks do you think are currently breached?</b></td></tr><tr><td class="rfsmall" width="50%"><b>Answers</b></td><td class="rfsmall" width="50%"><b>Results</b></td></tr><tr><td style="padding:10px;" class="rfsmall">0% — They hire only the best and are usually impenetrable.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">10% — I'm sure some hackers get in but are quickly caught.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">20% — I want to believe 20% is the worst it can be.<td style="text-align:right;background: linear-gradient(to right, lightblue 75%, white 50%);">75%</td></tr><tr><td style="padding:10px;" class="rfsmall">50% — I've worked some of these places and it's a toss up.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr><tr><td style="padding:10px;" class="rfsmall">80% — It's a constant battle we are losing to ignorance and incompetence.<td style="text-align:right;background: linear-gradient(to right, lightblue 25%, white 50%);">25%</td></tr><tr><td style="padding:10px;" class="rfsmall">100% — Every company or agency I've worked at has been compromised for some time.<td style="text-align:right;background: linear-gradient(to right, lightblue 0%, white 50%);">0%</td></tr></table></div></div><div class="mobil row"><div class="col-md-12 col-lg-12"><span class="retro">Visit a Sponsor (<img style="height:16px;" src="/icons/downarrow.png">)</span><br><br><div class="card" style="background-color:#F5F5F5;border-radius:5px;border: 1px solid lightgray;height:88%;"> <div class="card-body rfsmall" style="display:inline;"> <div class="brows"> <table border="0" style="width: 100%;"><tr><td style="text-align: center;"><a href="https://packetstorm.news/help/view/24"><img style="height: 280px; width: 280px;" src="/uimg/adpic/large-966c9532cce86dfe25ad945aebd757e63d9fca9881575d75624b82c3e70ab695.png"></a></td><td style="padding-left: 20px; text-align:left; width:80%;" class="rflarge retro"><span style="font-size:22px;font-weight: bold;"><a href="https://packetstorm.news/help/view/24">Get your new product or service noticed on Packet Storm today!</a></span></td></tr><tr><td colspan="2" style="text-align: left; padding-top: 20px;font-size:16px;"><br><a href="https://packetstorm.news/help/view/24">Packet Storm now offers advertising. There's no better way to reach the security community. Try it out!</a></td></tr></table> </div><div class="mobil"> <table border="0" style="width: 100%;"><tr><td style="text-align: center;"><a href="https://packetstorm.news/help/view/24"><img style="height: 280px; width: 280px;" src="/uimg/adpic/large-966c9532cce86dfe25ad945aebd757e63d9fca9881575d75624b82c3e70ab695.png"></a></td></tr><tr><td style="text-align:left; width:80%;" class="rflarge retro"><br><span style="font-size:22px;font-weight: bold;"><a href="https://packetstorm.news/help/view/24">Get your new product or service noticed on Packet Storm today!</a></span></td></tr><tr><td colspan="2" style="text-align: left; padding-top: 20px;font-size:16px;"><a href="https://packetstorm.news/help/view/24">Packet Storm now offers advertising. There's no better way to reach the security community. Try it out!</a></td></tr></table> </div> </div></div><p/></div></div> <div class="fponlymc mobil row"><div class="col-md-12 col-lg-12"><span class="retro">Files (<a href="/files/main/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188741/">Gentoo Linux Security Advisory 202501-03</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188740/">Gentoo Linux Security Advisory 202501-02</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188739/">Debian Security Advisory 5843-2</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188738/">CISA: Closing The Software Understanding Gap</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188737/">iPhone Visual Voicemail IMAP NAMESPACE Use-After-Free</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188736/">Emsisoft Anti-Malware Net-NTLMv2 Hash Information Disclosure</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188735/">Ubuntu Security Notice USN-7216-1</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188734/">Ubuntu Security Notice USN-7206-2</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188733/">Red Hat Security Advisory 2025-0390-03</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="/files/id/188732/">Ubuntu Security Notice USN-7209-1</a><br/>Posted: 2025-01-17</div></div><br/></div></div><div class="mobil row"><div class="col-md-12 col-lg-12"><span class="retro">News (<a href="/news/main/page/1"><img style="height:16px;" src="/icons/rightarrow.png"></a>)</span><br><br><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.securityweek.com/microsoft-patches-trio-of-exploited-windows-hyper-v-zero-days/">Microsoft Patches Trio of Exploited Windows Hyper-V Zero Days</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/4-2-million-internet-hosts-hijacked-via-bugs-in-tunneling-protocols">4.2 Million Hosts Hijacked Via Bugs in Tunneling Protocols</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/">Microsoft Eggheads Say AI Can Never Be Made Secure after Testing Their Own Products</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.theregister.com/2025/01/17/gateshead_council_cybersecurity_incident/">Medusa Ransomware Group Claims Attack on UK's Gateshead Council</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.bleepingcomputer.com/news/security/w3-total-cache-plugin-flaw-exposes-1-million-wordpress-sites-to-attacks/">W3 Total Cache Plugin Exposes 1 Million WordPress Sites to Attack</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/ransomhub-infection-facilitated-by-possible-ai-assisted-python-backdoor">RansomHub Infection Facilitated by Possible AI-Assisted Python Backdoor</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/">US Announces Sanctions against North Korean Fake IT Worker Network</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.reuters.com/legal/us-supreme-court-upholds-law-banning-tiktok-2025-01-17/">US Supreme Court Upholds Law Banning TikTok</a><br/>Posted: 2025-01-17</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/four-take-guilty-pleas-in-us-government-it-bribery-scam">Four Take Guilty Pleas in US Government IT Bribery Scam</a><br/>Posted: 2025-01-16</div></div><br/><div class="dcard" style="background: linear-gradient(180deg, #D5D5D5, white);hover { border: 1px solid #3E7DD5 !important; };height:110px;"><div class="card-body rfmedium" style="display:inline;"><a href="https://www.scworld.com/news/north-koreas-it-worker-scam-linked-to-2016-crowdfunding-operation">North Korea's IT Worker Scam Linked to 2016 Crowdfunding Operation</a><br/>Posted: 2025-01-16</div></div><br/></div></div></div> </section> <div class="footme center fixed-bottom rfdark upperme"> <a href="/help/view/4">About</a> | <a class="lightenup" href="/tos/">Terms</a> | <a class="lightenup" href="/help/view/7">Copyright</a> | <a class="lightenup" href="/help/view/6">Privacy</a> | <a class="lightenup" href="https://bsky.app/profile/packetstorm.bsky.social" target="_new">BlueSky</a> | <a class="lightenup" href="https://x.com/packet_storm" target="_new">X</a> | <a class="lightenup" href="https://infosec.exchange/@packet_storm/" target="_new">Mastodon</a> <br/> © 2024 - 2025 <br class="responsive"/>All Rights Reserved <a href="https://packetstorm.news/">Packet Storm Security, LLC</a> <br class="responsive"/><span class="hidden">|</span> <span class="formatme">Hosting provided by: <a href="https://www.rokasecurity.com/">RokaSecurity</a></span> </div> <script> document.getElementById("noenter").onkeypress = function(e) { var key = e.charCode || e.keyCode || 0; if (key == 13) { e.preventDefault(); } } </script> </body> </html>
URL
GET https://packetstormsecurity.com/
Response Headers
Content-Length:162Content-Type:text/htmlDate:Sat, 18 Jan 2025 07:33:14 GMTLocation:https://packetstorm.news/Server:nginx
Response Body
<html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Resolver
Resolver ASN
AS15169
Resolver IP
172.217.36.88
Resolver Network Name
Google LLC
Report ID
20250118T073027Z_webconnectivity_DO_6400_n1_0rVu3qouyqHsHoeo
Platform
linux
Software Name
ooniprobe-cli-unattended (3.23.0)
Measurement Engine
ooniprobe-engine (3.23.0)