Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity Medium Analysis Summary CVE-2023-3740 CVSS:6.5 Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient validation of untrusted input in Themes. […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]
Severity Medium Analysis Summary Analysis Summary The AZORULT malware is an information stealer which was discovered in 2016. This malware steals IDs, browsing history, cookies, passwords, […]
Severity Medium Analysis Summary CVE-2023-37463 Github cmark-gfm is vulnerable to a denial of service, caused by three polynomial time complexity issues. By sending a specially crafted […]
Severity Medium Analysis Summary CVE-2023-2975 OpenSSL could allow a remote attacker to bypass security restrictions, caused by AES-SIV cipher implementation. By sending a specially-crafted request using […]
Severity High Analysis Summary APT37, also known as Reaper or Group123, is an advanced persistent threat group believed to be based in North Korea. One of […]
Severity Medium Analysis Summary NjRat is a Remote Access Trojan, which is found leveraging Pastebin to deliver a second-stage payload after initial infection. There are multiple […]
Severity High Analysis Summary CVE-2023-26512 Apache EventMesh could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in […]