Severity Medium Analysis Summary CVE-2023-38435 Apache Felix Healthcheck Webconsole Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could […]
Severity High Analysis Summary CVE-2023-38647 Apache Helix could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the […]
Severity Medium Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity High Analysis Summary Ransomware attacks are on the rise, posing significant challenges for organizations worldwide. A recent investigation by the Incident Response team into the […]
Severity Medium Analysis Summary CVE-2023-32437 Apple iOS and iPadOS could allow a local attacker to bypass security restrictions, caused by an issue in the NSURLSession component. […]
Severity Medium Analysis Summary CVE-2023-34478 Apache Shiro could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of user request. […]
Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary A critical vulnerability, known as “Zenbleed,” has been discovered by Google’s security researcher Tavis Ormandy, impacting AMD Zen2 CPUs. The flaw, tracked […]
Severity High Analysis Summary The Lazarus hacking group, a state-sponsored cybercrime collective from North Korea, has been engaging in a sophisticated campaign to breach Windows Internet […]