Severity High Analysis Summary CVE-2023-26134 Node.js git-commit-info module could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper parameter validation […]
Severity High Analysis Summary In double-extortion attacks targeting companies worldwide, the Akira ransomware operation employs a Linux encryptor to encrypt VMware ESXi virtual machines. Initially targeting Windows […]
Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary Stealc is a new malware that was first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums […]
Severity High Analysis Summary The Konni APT (Advanced Persistent Threat) group is a cyber espionage group that has been active since at least 2014. It is […]
Severity High Analysis Summary The National Telecommunication and Information Technology Security Board (NTISB) has issued a warning to government departments regarding the use of Indian/Israeli IT-related […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – is a Russia-backed advanced persistent threat (APT) that has […]
Severity High Analysis Summary The 8Base ransomware gang has emerged as a significant threat, targeting organizations globally with double-extortion attacks since the beginning of June. While […]
Severity High Analysis Summary STRRat is a Java-based Remote-Access Trojan (RAT) with a slew of malicious features, notably information theft and backdoor capabilities. This RAT was […]