Severity Medium Analysis Summary Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be […]
Severity High Analysis Summary CVE-2023-33234 Apache Airflow CNCF Kubernetes Provider could allow a remote attacker to execute arbitrary code on the system, caused by a flaw […]
Severity High Analysis Summary An email protection and network security services provider has issued a warning regarding a zero-day vulnerability that has been exploited to compromise […]
Severity High Analysis Summary CVE-2023-32165 CVSS:9.8 D-Link D-View could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in TftpReceiveFileHandler […]
Severity Medium Analysis Summary Cobalt Strike first appeared in 2012 in response to alleged flaws in the Metasploit Framework, an existing red team (penetration testing) tool. […]
Severity Medium Analysis Summary CVE-2023-44520 CVSS:7.8 Adobe Acrobat Reader DC could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free […]
Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary CVE-2023-32534 CVSS:6.1 Trend Micro Apex Central is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]