Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity Medium Analysis Summary CVE-2023-41996 Apple macOS Ventura could allow a local attacker to bypass security restrictions, caused by an issue in the Sandbox component. By […]
Severity High Analysis Summary CVE-2023-20033 CVSS: 8.6 Cisco IOS XE Software for Catalyst 3650 and Catalyst 3850 Series Switches is vulnerable to a denial of service, […]
Severity High Analysis Summary CVE-2023-5129 Google Chrome is vulnerable to a heap-based buffer overflow, caused by an out-of-bounds write in the ReadHuffmanCodes() function. By persuading a […]
Severity High Analysis Summary Cybersecurity and law enforcement agencies of the US and Japan have issued a warning for the Chinese-origin group “BlackTech” that has been […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary A previously undiscovered advanced backdoor has come to light called as Deadglyph, which was seen being used by threat actor Stealth Falcon […]
Severity High Analysis Summary CVE-2023-5187 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in Extensions. […]
Severity Medium Analysis Summary CVE-2023-42756 Linux Kernel is vulnerable to a denial of service, caused by a race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP in netfilter/ip_set. By […]