Severity High Analysis Summary CVE-2024-23226 CVSS:8.8 Apple visionOS could allow a remote attacker to execute arbitrary code on the system, caused by an issue in the […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary Patchwork is an Advanced Persistent Threat APT group active since at least 2014. Patchwork primarily targets government, defense, and diplomatic organizations, as […]
Severity Medium Analysis Summary GCleaner is a type of malware that disguises itself as a legitimate software program called “GCleaner” or “G-Cleaner.” It is typically spread […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary Microsoft disclosed that the Russian state-sponsored threat group, Midnight Blizzard (aka APT29), accessed internal systems and source code repositories using authentication secrets […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity Medium Analysis Summary FormBook is an infostealer malware that was first identified in 2016. It tracks and monitors keystrokes, finds and accesses files, takes screenshots, […]
Severity Medium Analysis Summary CVE-2023-46169 CVSS:6.5 IBM DS8900F HMC 89.21.19.0, 89.21.31.0, 89.30.68.0, 89.32.40.0, and 89.33.48.0 could allow an authenticated user to arbitrarily delete a file. CVE-2023-46170 […]