Severity High Analysis Summary APT-C-35 (also known as “Donot APT Group”) is a cyber espionage group that has been active since at least 2013. The group […]
Severity Medium Analysis Summary IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. IcedID malware […]
Severity Medium Analysis Summary CVE-2023-5207 CVSS:8.2 GitLab could allow a remote authenticated attacker to execute arbitrary code on the system, caused by improper neutralization of user […]
Severity Medium Analysis Summary CVE-2023-43125 CVSS:6.8 F5 BIG-IP could allow a remote attacker from within the local network to bypass security restrictions. An attacker could exploit […]
Severity Medium Analysis Summary CVE-2023-39410 Apache Avro Java SDK could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]
Severity High Analysis Summary CVE-2023-32477 Dell Common Event Enabler could allow a local authenticated attacker to gain elevated privileges on the system, caused by an improper […]
Severity High Analysis Summary The most recent report from the Regulatory Authority addresses cyberattacks targeting financial institutions and underscores the critical importance of prioritizing cybersecurity preparedness. […]
Severity High Analysis Summary Some fraudulent Bitwarden websites are allegedly delivering installers for the open-source password manager which carries a new malware used for stealing passwords […]