Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary CVE-2023-36559 Microsoft Edge (Chromium-based) could allow a remote attacker to conduct spoofing attacks. Impact Indicators Of Compromise CVE Affected Vendors Microsoft Affected […]
Severity High Analysis Summary CVE-2023-20198 Cisco IOS XE could allow a remote attacker to gain elevated privileges on the system, caused by active exploitation of a […]
Severity Medium Analysis Summary CVE-2023-36416 CVSS: 6.1 Microsoft Dynamics 365 (on-premises) is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker […]
Severity High Analysis Summary During July and September, malicious activity regarding DarkGate malware has increased as threat actors used compromised Skype accounts to spread the malware […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary CVE-2023-4562 Mitsubishi Electric MELSEC-F Series could allow a remote attacker to bypass security restrictions, caused by authentication bypass by capture-replay in the […]
Severity Medium Analysis Summary CVE-2023-42663 CVSS:6.5 Apache Airflow could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission verification. By sending a […]
Severity Medium Analysis Summary CVE-2023-5474 CVSS:8.8 Google Chrome is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by PDF. By persuading a victim […]