Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary Turla, a Russian espionage threat actor, infected and compromised many systems of an unknown non-governmental organization (NGO) in Europe by deploying a […]
Severity Low Analysis Summary CVE-2024-26246 Microsoft Edge (Chromium-based) could allow a physical authenticated attacker to bypass security restrictions. An attacker could exploit this vulnerability to bypass […]
Severity Medium Analysis Summary CVE-2024-22453 CVSS:7.2 Dell PowerEdge is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the BIOS. By sending a […]
Severity High Analysis Summary The United Arab Emirates (UAE) is rapidly pursuing digital transformation initiatives to position itself as a global hub for business and innovation […]
Severity High Analysis Summary A novel malware campaign delivering AZORult was discovered by cybersecurity researchers, which uses HTML smuggling and forged Google site pages to spread […]
Severity Medium Analysis Summary CVE-2024-26056 CVSS:5.4 Adobe Experience Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could […]
Severity High Analysis Summary OilRig, aka HelixKitten, APT 34, and Twisted Kitten, is a suspected Iranian threat group targeting Middle Eastern and international victims since at […]