Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity Medium Analysis Summary CVE-2024-23284 CVSS:6.5 Apple Safari could allow a remote attacker to bypass security restrictions, caused by a logic issue in the WebKit component. […]
Severity Medium Analysis Summary CVE-2024-25987 CVSS:6.7 Google Android could allow a local authenticated attacker to gain elevated privileges on the system, caused by an out-of-bounds write […]
Severity High Analysis Summary CVE-2024-27206 CVSS:7.5 Google Android could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read flaw. By sending a […]
Severity Medium Analysis Summary Remcos malware has been operating since 2016. This RAT was originally promoted as genuine software for remote control of Microsoft Windows from […]
Severity High Analysis Summary Okta has recently denied that its company’s data was leaked after a hacker published files on a dark web forum, claiming that […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]
Severity High Analysis Summary Brazilian users are being targeted by a novel banking trojan dubbed CHAVECLOAK, distributed through phishing emails with PDF file attachments. The attack […]
Severity Medium Analysis Summary CVE-2024-21899 CVSS:9.8 QNAP QTS, QNAP QuTScloud, and QNAP QuTS hero could allow a remote attacker to bypass security restrictions, caused by improper […]