Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary CVE-2023-41847 CVSS: 6.5 Notice Bar Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote […]
Severity High Analysis Summary An advanced cyber threat actor group of Iranian origin called OilRig (aka APT34, Helix Kitten, Cobalt Gypsy, and Hazel Sandstorm) has been […]
Severity High Analysis Summary Ursnif banking trojan also known as Gozi and Dreambot has been around for more than 10 years. It gained popularity in 2015 […]
Severity Medium Analysis Summary CVE-2023-44265 CVSS: 5.9 Popup contact form Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A […]
Severity High Analysis Summary There is a warning issued by the FBI about a newly emerging trend of dual ransomware attacks that target the same victims […]
Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary CVE-2023-33200 CVSS:9.8 Google Android could provide weaker than expected security, caused by a flaw in the Arm Mali GPU Kernel Driver. An […]
Severity High Analysis Summary CVE-2023-5346 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in V8. […]