Severity High Analysis Summary CVE-2023-37450 Apple iOS, iPadOS and macOS Ventura could allow a remote attacker to execute arbitrary code on the system, caused by an […]
Severity High Analysis Summary SolarMarker, also known as Jupyter or Yellow Cockatoo, is a sophisticated and concerning infostealer malware that emerged in early 2021. It spreads […]
Severity High Analysis Summary TA453, a nation-state threat actor also known as Charming Kitten, PHOSPHORUS, and APT42, has been identified in a recent malware campaign targeting […]
Severity High Analysis Summary Vidar, which first appeared in late 2018, is a malware family that primarily acts as an information stealer and is frequently seen […]
Severity High Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary huckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary A new tool called “TeamsPhisher” has been made available on GitHub, allowing attackers to exploit a recently disclosed vulnerability in Microsoft Teams. […]
Severity Medium Analysis Summary IcedID, aka BokBot – a banking trojan – first appeared in 2017. The threat actor behind IcedID is Lunar Spider. IcedID malware […]
Severity High Analysis Summary CVE-2023-30449 CVSS:7.5 IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to denial of service with a specially […]