Severity High Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary The Federal Bureau of Investigation (FBI) has disclosed information regarding the activities of six cryptocurrency wallets linked to North Korea-affiliated threat actors. […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2023-20168 CVSS:7.1 Cisco NX-OS Software is vulnerable to a denial of service, caused by improper input validation when processing an authentication attempt […]
Severity High Analysis Summary CVE-2023-37379 Apache could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw in the test connection feature. By […]
Severity High Analysis Summary A new Advanced Persistent Threat (APT) hacking group, named ‘Carderbee,’ has recently been identified engaging in cyberattacks against organizations primarily in Hong […]
Severity High Analysis Summary Akira ransomware, a relatively new threat actor that emerged in March 2023, has shown a strategic focus on exploiting Cisco VPN (virtual […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity Medium Analysis Summary CVE-2023-28768 Zyxel XGS2220-30 is vulnerable to a denial of service, caused by improper frame handling. By sending a specially crafted frames to […]