Severity High Analysis Summary LockBit ransomware takes as little as five minutes to deploy the encryption routine on target systems once it lands on the victim […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity High Analysis Summary In early June, the IT services provider Xplain, based in Bern, Switzerland, experienced a Play ransomware attack that had a more significant […]
Severity High Analysis Summary CVE-2023-34285 NETGEAR RAX30 could allow a remote attacker to execute arbitrary code on the system, caused by a stack-based buffer overflow in […]
Severity High Analysis Summary CVE-2023-34148 CVSS:7.8 Trend Micro Apex One could allow a local authenticated attacker to gain elevated privileges on the system, caused by a […]
Severity High Analysis Summary Kimsuky is a North Korean advanced persistent threat (APT) group, also known as “Black Banshee”. The group has been active since at […]
Severity High Analysis Summary StormKitty information stealer is designed to compromise sensitive data from infected systems, such as login credentials, passwords, cryptocurrency wallets, and other valuable […]
Severity High Analysis Summary CVE-2023-26132 Node.js dottie module is vulnerable to a denial of service, caused by a prototype pollution flaw in the set() function in […]
Severity High Analysis Summary CVE-2023-27997 Fortinet FortiGate could allow a remote attacker to execute arbitrary code on the system, caused by an unspecified flaw in the […]