Severity High Analysis Summary According to researchers, BlackBit ransomware is being distributed in Korea. It is identified as a variant of LokiLocker ransomware and operates on […]
Severity High Analysis Summary Ducktail Malware is a malicious program designed by hackers to infiltrate computers and networks globally. Ducktail malware is typically delivered through a […]
Severity Medium Analysis Summary ModiLoader – aka DBatLoader or NatsoLoader – was initially identified in June 2020. It is a two-stage loader that has been seen […]
Severity Medium Analysis Summary CVE-2023-32980 CVSS:4.3 Jenkins Email Extension Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an […]
Severity Medium Analysis Summary CVE-2023-32990 CVSS:4.3 Jenkins Azure VM Agents Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. […]
Severity Medium Analysis Summary CVE-2023-32995 CVSS:4.3 Jenkins SAML Single Sign On(SSO) Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By […]
Severity Medium Analysis Summary QBot, often known as QakBot, is modular information malware. It has been operational since 2007. This banking Trojan, QakBot steals financial data […]
Severity High Analysis Summary VE-2023-2726 CVSS:8.8 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by an inappropriate implementation in […]
Severity High Analysis Summary Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered […]